Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/curl@8.19.0-3?distro=trixie
Typedeb
Namespacedebian
Namecurl
Version8.19.0-3
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-176a-agbw-hqdy
vulnerability_id VCID-176a-agbw-hqdy
summary curl: libcurl: QUIC Certificate Pinning Bypass
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5025.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5025.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-5025
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18841
published_at 2026-04-16T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.19078
published_at 2026-04-02T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.19129
published_at 2026-04-04T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18846
published_at 2026-04-07T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.18926
published_at 2026-04-08T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18979
published_at 2026-04-09T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.18986
published_at 2026-04-11T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.18939
published_at 2026-04-12T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.18888
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-5025
2
reference_url https://curl.se/docs/CVE-2025-5025.html
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Medium
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T16:19:34Z/
url https://curl.se/docs/CVE-2025-5025.html
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://hackerone.com/reports/3153497
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T16:19:34Z/
url https://hackerone.com/reports/3153497
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2368888
reference_id 2368888
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2368888
6
reference_url https://security.archlinux.org/AVG-2887
reference_id AVG-2887
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2887
7
reference_url https://curl.se/docs/CVE-2025-5025.json
reference_id CVE-2025-5025.json
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T16:19:34Z/
url https://curl.se/docs/CVE-2025-5025.json
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.0-1?distro=trixie
purl pkg:deb/debian/curl@8.14.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.0-1%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2025-5025
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-176a-agbw-hqdy
1
url VCID-1k8f-qgcv-xkhb
vulnerability_id VCID-1k8f-qgcv-xkhb
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27782.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27782.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27782
reference_id
reference_type
scores
0
value 0.00469
scoring_system epss
scoring_elements 0.64546
published_at 2026-04-16T12:55:00Z
1
value 0.00469
scoring_system epss
scoring_elements 0.64552
published_at 2026-04-11T12:55:00Z
2
value 0.00469
scoring_system epss
scoring_elements 0.6454
published_at 2026-04-12T12:55:00Z
3
value 0.00469
scoring_system epss
scoring_elements 0.64512
published_at 2026-04-13T12:55:00Z
4
value 0.00469
scoring_system epss
scoring_elements 0.64484
published_at 2026-04-02T12:55:00Z
5
value 0.00469
scoring_system epss
scoring_elements 0.64515
published_at 2026-04-04T12:55:00Z
6
value 0.00469
scoring_system epss
scoring_elements 0.64472
published_at 2026-04-07T12:55:00Z
7
value 0.00469
scoring_system epss
scoring_elements 0.6452
published_at 2026-04-08T12:55:00Z
8
value 0.00469
scoring_system epss
scoring_elements 0.64536
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27782
2
reference_url https://curl.se/docs/CVE-2022-27782.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-27782.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1555796
reference_id
reference_type
scores
url https://hackerone.com/reports/1555796
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082215
reference_id 2082215
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082215
21
reference_url https://security.archlinux.org/AVG-2706
reference_id AVG-2706
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2706
22
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
url https://security.gentoo.org/glsa/202212-01
23
reference_url https://access.redhat.com/errata/RHSA-2022:5245
reference_id RHSA-2022:5245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5245
24
reference_url https://access.redhat.com/errata/RHSA-2022:5313
reference_id RHSA-2022:5313
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5313
25
reference_url https://usn.ubuntu.com/5412-1/
reference_id USN-5412-1
reference_type
scores
url https://usn.ubuntu.com/5412-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.83.1-1?distro=trixie
purl pkg:deb/debian/curl@7.83.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.1-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2022-27782
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1k8f-qgcv-xkhb
2
url VCID-1mf9-u8y1-zbb1
vulnerability_id VCID-1mf9-u8y1-zbb1
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may allow attackers to bypass intended restrictions.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3558
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000101.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000101.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000101
reference_id
reference_type
scores
0
value 0.00624
scoring_system epss
scoring_elements 0.70084
published_at 2026-04-01T12:55:00Z
1
value 0.00624
scoring_system epss
scoring_elements 0.7019
published_at 2026-04-16T12:55:00Z
2
value 0.00624
scoring_system epss
scoring_elements 0.70088
published_at 2026-04-07T12:55:00Z
3
value 0.00624
scoring_system epss
scoring_elements 0.70135
published_at 2026-04-08T12:55:00Z
4
value 0.00624
scoring_system epss
scoring_elements 0.70151
published_at 2026-04-09T12:55:00Z
5
value 0.00624
scoring_system epss
scoring_elements 0.70175
published_at 2026-04-11T12:55:00Z
6
value 0.00624
scoring_system epss
scoring_elements 0.7016
published_at 2026-04-12T12:55:00Z
7
value 0.00624
scoring_system epss
scoring_elements 0.70147
published_at 2026-04-13T12:55:00Z
8
value 0.00624
scoring_system epss
scoring_elements 0.70096
published_at 2026-04-02T12:55:00Z
9
value 0.00624
scoring_system epss
scoring_elements 0.70111
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000101
3
reference_url https://curl.haxx.se/docs/adv_20170809A.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_20170809A.html
4
reference_url https://curl.se/docs/CVE-2017-1000101.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2017-1000101.html
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://support.apple.com/HT208221
reference_id
reference_type
scores
url https://support.apple.com/HT208221
10
reference_url http://www.debian.org/security/2017/dsa-3992
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3992
11
reference_url http://www.securityfocus.com/bid/100249
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100249
12
reference_url http://www.securitytracker.com/id/1039117
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039117
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1478309
reference_id 1478309
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1478309
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871554
reference_id 871554
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871554
15
reference_url https://security.archlinux.org/ASA-201708-16
reference_id ASA-201708-16
reference_type
scores
url https://security.archlinux.org/ASA-201708-16
16
reference_url https://security.archlinux.org/AVG-370
reference_id AVG-370
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-370
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.37.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.47.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.49.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.49.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.49.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.49.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.49.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.49.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.50.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.50.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.50.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.50.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.51.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.51.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.51.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.52.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.52.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.52.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.52.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.52.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.52.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.53.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.54.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.54.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.54.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.54.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.54.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.54.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.55.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.55.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.55.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000101
reference_id CVE-2017-1000101
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000101
50
reference_url https://security.gentoo.org/glsa/201709-14
reference_id GLSA-201709-14
reference_type
scores
url https://security.gentoo.org/glsa/201709-14
51
reference_url https://usn.ubuntu.com/3441-1/
reference_id USN-3441-1
reference_type
scores
url https://usn.ubuntu.com/3441-1/
fixed_packages
0
url pkg:deb/debian/curl@7.55.0-1?distro=trixie
purl pkg:deb/debian/curl@7.55.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.55.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2017-1000101
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1mf9-u8y1-zbb1
3
url VCID-26ju-84rx-c7b9
vulnerability_id VCID-26ju-84rx-c7b9
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may allow attackers to bypass intended restrictions.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3558
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7407.json
reference_id
reference_type
scores
0
value 2.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7407.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7407
reference_id
reference_type
scores
0
value 0.00282
scoring_system epss
scoring_elements 0.51472
published_at 2026-04-01T12:55:00Z
1
value 0.00282
scoring_system epss
scoring_elements 0.51614
published_at 2026-04-16T12:55:00Z
2
value 0.00282
scoring_system epss
scoring_elements 0.51563
published_at 2026-04-08T12:55:00Z
3
value 0.00282
scoring_system epss
scoring_elements 0.5156
published_at 2026-04-09T12:55:00Z
4
value 0.00282
scoring_system epss
scoring_elements 0.51604
published_at 2026-04-11T12:55:00Z
5
value 0.00282
scoring_system epss
scoring_elements 0.51583
published_at 2026-04-12T12:55:00Z
6
value 0.00282
scoring_system epss
scoring_elements 0.51572
published_at 2026-04-13T12:55:00Z
7
value 0.00282
scoring_system epss
scoring_elements 0.51523
published_at 2026-04-02T12:55:00Z
8
value 0.00282
scoring_system epss
scoring_elements 0.51549
published_at 2026-04-04T12:55:00Z
9
value 0.00282
scoring_system epss
scoring_elements 0.51509
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7407
3
reference_url https://curl.se/docs/CVE-2017-7407.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2017-7407.html
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:P/I:N/A:N
1
value 2.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13
reference_id
reference_type
scores
url https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13
7
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1439190
reference_id 1439190
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1439190
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859500
reference_id 859500
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859500
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7407
reference_id CVE-2017-7407
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 2.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-7407
12
reference_url https://security.gentoo.org/glsa/201709-14
reference_id GLSA-201709-14
reference_type
scores
url https://security.gentoo.org/glsa/201709-14
13
reference_url https://usn.ubuntu.com/3441-1/
reference_id USN-3441-1
reference_type
scores
url https://usn.ubuntu.com/3441-1/
14
reference_url https://usn.ubuntu.com/3441-2/
reference_id USN-3441-2
reference_type
scores
url https://usn.ubuntu.com/3441-2/
fixed_packages
0
url pkg:deb/debian/curl@7.52.1-4?distro=trixie
purl pkg:deb/debian/curl@7.52.1-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.52.1-4%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2017-7407
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-26ju-84rx-c7b9
4
url VCID-26p8-15d6-kbb1
vulnerability_id VCID-26p8-15d6-kbb1
summary libcurl: Double Close of Eventfd in libcurl
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0665.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0665.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0665
reference_id
reference_type
scores
0
value 0.04569
scoring_system epss
scoring_elements 0.89221
published_at 2026-04-16T12:55:00Z
1
value 0.04569
scoring_system epss
scoring_elements 0.89164
published_at 2026-04-02T12:55:00Z
2
value 0.04569
scoring_system epss
scoring_elements 0.89179
published_at 2026-04-04T12:55:00Z
3
value 0.04569
scoring_system epss
scoring_elements 0.89182
published_at 2026-04-07T12:55:00Z
4
value 0.04569
scoring_system epss
scoring_elements 0.892
published_at 2026-04-08T12:55:00Z
5
value 0.04569
scoring_system epss
scoring_elements 0.89204
published_at 2026-04-09T12:55:00Z
6
value 0.04569
scoring_system epss
scoring_elements 0.89214
published_at 2026-04-11T12:55:00Z
7
value 0.04569
scoring_system epss
scoring_elements 0.8921
published_at 2026-04-12T12:55:00Z
8
value 0.04569
scoring_system epss
scoring_elements 0.89208
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0665
2
reference_url https://curl.se/docs/CVE-2025-0665.html
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-17T17:42:03Z/
url https://curl.se/docs/CVE-2025-0665.html
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://hackerone.com/reports/2954286
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-17T17:42:03Z/
url https://hackerone.com/reports/2954286
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2343895
reference_id 2343895
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2343895
6
reference_url https://curl.se/docs/CVE-2025-0665.json
reference_id CVE-2025-0665.json
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-17T17:42:03Z/
url https://curl.se/docs/CVE-2025-0665.json
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.12.0%2Bgit20250209.89ed161%2Bds-1?distro=trixie
purl pkg:deb/debian/curl@8.12.0%2Bgit20250209.89ed161%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.12.0%252Bgit20250209.89ed161%252Bds-1%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2025-0665
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-26p8-15d6-kbb1
5
url VCID-29n1-4u2b-tkgj
vulnerability_id VCID-29n1-4u2b-tkgj
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16842.json
reference_id
reference_type
scores
0
value 3.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16842.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16842
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.31838
published_at 2026-04-01T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.31828
published_at 2026-04-07T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.31967
published_at 2026-04-02T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.32009
published_at 2026-04-04T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.31881
published_at 2026-04-08T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.31909
published_at 2026-04-09T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31913
published_at 2026-04-11T12:55:00Z
7
value 0.00162
scoring_system epss
scoring_elements 0.37128
published_at 2026-04-12T12:55:00Z
8
value 0.00162
scoring_system epss
scoring_elements 0.37101
published_at 2026-04-13T12:55:00Z
9
value 0.00162
scoring_system epss
scoring_elements 0.37148
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16842
2
reference_url https://curl.se/docs/CVE-2018-16842.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-16842.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1644124
reference_id 1644124
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1644124
7
reference_url https://security.archlinux.org/ASA-201811-4
reference_id ASA-201811-4
reference_type
scores
url https://security.archlinux.org/ASA-201811-4
8
reference_url https://security.archlinux.org/AVG-795
reference_id AVG-795
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-795
9
reference_url https://security.gentoo.org/glsa/201903-03
reference_id GLSA-201903-03
reference_type
scores
url https://security.gentoo.org/glsa/201903-03
10
reference_url https://access.redhat.com/errata/RHSA-2019:2181
reference_id RHSA-2019:2181
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:2181
11
reference_url https://usn.ubuntu.com/3805-1/
reference_id USN-3805-1
reference_type
scores
url https://usn.ubuntu.com/3805-1/
12
reference_url https://usn.ubuntu.com/3805-2/
reference_id USN-3805-2
reference_type
scores
url https://usn.ubuntu.com/3805-2/
fixed_packages
0
url pkg:deb/debian/curl@7.62.0-1?distro=trixie
purl pkg:deb/debian/curl@7.62.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.62.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2018-16842
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-29n1-4u2b-tkgj
6
url VCID-2b39-ubrt-hkc6
vulnerability_id VCID-2b39-ubrt-hkc6
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5436.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5436.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-5436
reference_id
reference_type
scores
0
value 0.11139
scoring_system epss
scoring_elements 0.93439
published_at 2026-04-01T12:55:00Z
1
value 0.11139
scoring_system epss
scoring_elements 0.93473
published_at 2026-04-11T12:55:00Z
2
value 0.11139
scoring_system epss
scoring_elements 0.93467
published_at 2026-04-09T12:55:00Z
3
value 0.11139
scoring_system epss
scoring_elements 0.93464
published_at 2026-04-08T12:55:00Z
4
value 0.11139
scoring_system epss
scoring_elements 0.93456
published_at 2026-04-07T12:55:00Z
5
value 0.11139
scoring_system epss
scoring_elements 0.93447
published_at 2026-04-02T12:55:00Z
6
value 0.11139
scoring_system epss
scoring_elements 0.93455
published_at 2026-04-04T12:55:00Z
7
value 0.13273
scoring_system epss
scoring_elements 0.94177
published_at 2026-04-16T12:55:00Z
8
value 0.13273
scoring_system epss
scoring_elements 0.94161
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-5436
2
reference_url https://curl.se/docs/CVE-2019-5436.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2019-5436.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5436
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/550696
reference_id
reference_type
scores
url https://hackerone.com/reports/550696
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1710620
reference_id 1710620
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1710620
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929351
reference_id 929351
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929351
8
reference_url https://security.archlinux.org/ASA-201905-11
reference_id ASA-201905-11
reference_type
scores
url https://security.archlinux.org/ASA-201905-11
9
reference_url https://security.archlinux.org/ASA-201905-12
reference_id ASA-201905-12
reference_type
scores
url https://security.archlinux.org/ASA-201905-12
10
reference_url https://security.archlinux.org/ASA-201905-13
reference_id ASA-201905-13
reference_type
scores
url https://security.archlinux.org/ASA-201905-13
11
reference_url https://security.archlinux.org/ASA-201905-14
reference_id ASA-201905-14
reference_type
scores
url https://security.archlinux.org/ASA-201905-14
12
reference_url https://security.archlinux.org/ASA-201905-15
reference_id ASA-201905-15
reference_type
scores
url https://security.archlinux.org/ASA-201905-15
13
reference_url https://security.archlinux.org/ASA-201905-16
reference_id ASA-201905-16
reference_type
scores
url https://security.archlinux.org/ASA-201905-16
14
reference_url https://security.archlinux.org/AVG-959
reference_id AVG-959
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-959
15
reference_url https://security.archlinux.org/AVG-960
reference_id AVG-960
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-960
16
reference_url https://security.archlinux.org/AVG-961
reference_id AVG-961
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-961
17
reference_url https://security.archlinux.org/AVG-962
reference_id AVG-962
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-962
18
reference_url https://security.archlinux.org/AVG-963
reference_id AVG-963
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-963
19
reference_url https://security.archlinux.org/AVG-964
reference_id AVG-964
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-964
20
reference_url https://security.gentoo.org/glsa/202003-29
reference_id GLSA-202003-29
reference_type
scores
url https://security.gentoo.org/glsa/202003-29
21
reference_url https://access.redhat.com/errata/RHSA-2020:1020
reference_id RHSA-2020:1020
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1020
22
reference_url https://access.redhat.com/errata/RHSA-2020:1792
reference_id RHSA-2020:1792
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1792
23
reference_url https://access.redhat.com/errata/RHSA-2020:2505
reference_id RHSA-2020:2505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2505
24
reference_url https://usn.ubuntu.com/3993-1/
reference_id USN-3993-1
reference_type
scores
url https://usn.ubuntu.com/3993-1/
25
reference_url https://usn.ubuntu.com/3993-2/
reference_id USN-3993-2
reference_type
scores
url https://usn.ubuntu.com/3993-2/
fixed_packages
0
url pkg:deb/debian/curl@7.64.0-4?distro=trixie
purl pkg:deb/debian/curl@7.64.0-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.64.0-4%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2019-5436
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2b39-ubrt-hkc6
7
url VCID-2cx5-1qnw-uufj
vulnerability_id VCID-2cx5-1qnw-uufj
summary curl: curl: Authentication bypass due to incorrect connection reuse with Negotiate authentication
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1965.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1965.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1965
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.17246
published_at 2026-04-04T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.17194
published_at 2026-04-02T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.16802
published_at 2026-04-07T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.16891
published_at 2026-04-08T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.16949
published_at 2026-04-09T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.16923
published_at 2026-04-11T12:55:00Z
6
value 0.00062
scoring_system epss
scoring_elements 0.19261
published_at 2026-04-13T12:55:00Z
7
value 0.00062
scoring_system epss
scoring_elements 0.19223
published_at 2026-04-16T12:55:00Z
8
value 0.00062
scoring_system epss
scoring_elements 0.19316
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1965
2
reference_url https://curl.se/docs/CVE-2026-1965.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Medium
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:31:56Z/
url https://curl.se/docs/CVE-2026-1965.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1965
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2446448
reference_id 2446448
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2446448
6
reference_url https://curl.se/docs/CVE-2026-1965.json
reference_id CVE-2026-1965.json
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:31:56Z/
url https://curl.se/docs/CVE-2026-1965.json
7
reference_url https://usn.ubuntu.com/8084-1/
reference_id USN-8084-1
reference_type
scores
url https://usn.ubuntu.com/8084-1/
8
reference_url https://usn.ubuntu.com/8099-1/
reference_id USN-8099-1
reference_type
scores
url https://usn.ubuntu.com/8099-1/
fixed_packages
0
url pkg:deb/debian/curl@8.19.0~rc3-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0~rc3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0~rc3-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2026-1965
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2cx5-1qnw-uufj
8
url VCID-2f5z-vxsz-yqdv
vulnerability_id VCID-2f5z-vxsz-yqdv
summary A vulnerability in cURL may allow for arbitrary file access.
references
0
reference_url http://curl.haxx.se/docs/adv_20090303.html
reference_id
reference_type
scores
url http://curl.haxx.se/docs/adv_20090303.html
1
reference_url http://curl.haxx.se/lxr/source/CHANGES
reference_id
reference_type
scores
url http://curl.haxx.se/lxr/source/CHANGES
2
reference_url http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html
4
reference_url http://lists.vmware.com/pipermail/security-announce/2009/000060.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2009/000060.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0037.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0037.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0037
reference_id
reference_type
scores
0
value 0.09542
scoring_system epss
scoring_elements 0.9286
published_at 2026-04-16T12:55:00Z
1
value 0.09542
scoring_system epss
scoring_elements 0.9285
published_at 2026-04-13T12:55:00Z
2
value 0.09542
scoring_system epss
scoring_elements 0.92823
published_at 2026-04-01T12:55:00Z
3
value 0.09542
scoring_system epss
scoring_elements 0.9283
published_at 2026-04-02T12:55:00Z
4
value 0.09542
scoring_system epss
scoring_elements 0.92834
published_at 2026-04-04T12:55:00Z
5
value 0.09542
scoring_system epss
scoring_elements 0.92832
published_at 2026-04-07T12:55:00Z
6
value 0.09542
scoring_system epss
scoring_elements 0.92841
published_at 2026-04-08T12:55:00Z
7
value 0.09542
scoring_system epss
scoring_elements 0.92845
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0037
7
reference_url https://curl.se/docs/CVE-2009-0037.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2009-0037.html
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037
9
reference_url http://secunia.com/advisories/34138
reference_id
reference_type
scores
url http://secunia.com/advisories/34138
10
reference_url http://secunia.com/advisories/34202
reference_id
reference_type
scores
url http://secunia.com/advisories/34202
11
reference_url http://secunia.com/advisories/34237
reference_id
reference_type
scores
url http://secunia.com/advisories/34237
12
reference_url http://secunia.com/advisories/34251
reference_id
reference_type
scores
url http://secunia.com/advisories/34251
13
reference_url http://secunia.com/advisories/34255
reference_id
reference_type
scores
url http://secunia.com/advisories/34255
14
reference_url http://secunia.com/advisories/34259
reference_id
reference_type
scores
url http://secunia.com/advisories/34259
15
reference_url http://secunia.com/advisories/34399
reference_id
reference_type
scores
url http://secunia.com/advisories/34399
16
reference_url http://secunia.com/advisories/35766
reference_id
reference_type
scores
url http://secunia.com/advisories/35766
17
reference_url http://security.gentoo.org/glsa/glsa-200903-21.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200903-21.xml
18
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/49030
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/49030
19
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.476602
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.476602
20
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11054
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11054
21
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6074
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6074
22
reference_url http://support.apple.com/kb/HT4077
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4077
23
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0042
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0042
24
reference_url http://www.debian.org/security/2009/dsa-1738
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1738
25
reference_url http://www.redhat.com/support/errata/RHSA-2009-0341.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0341.html
26
reference_url http://www.securityfocus.com/archive/1/501757/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/501757/100/0/threaded
27
reference_url http://www.securityfocus.com/archive/1/504849/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/504849/100/0/threaded
28
reference_url http://www.securityfocus.com/bid/33962
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/33962
29
reference_url http://www.securitytracker.com/id?1021783
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021783
30
reference_url http://www.ubuntu.com/usn/USN-726-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-726-1
31
reference_url http://www.vmware.com/security/advisories/VMSA-2009-0009.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2009-0009.html
32
reference_url http://www.vupen.com/english/advisories/2009/0581
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0581
33
reference_url http://www.vupen.com/english/advisories/2009/1865
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1865
34
reference_url http://www.withdk.com/2009/03/03/curllibcurl-redirect-arbitrary-file-access/
reference_id
reference_type
scores
url http://www.withdk.com/2009/03/03/curllibcurl-redirect-arbitrary-file-access/
35
reference_url http://www.withdk.com/archives/Libcurl_arbitrary_file_access.pdf
reference_id
reference_type
scores
url http://www.withdk.com/archives/Libcurl_arbitrary_file_access.pdf
36
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=485271
reference_id 485271
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=485271
37
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=518423
reference_id 518423
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=518423
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:5.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:5.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:5.11:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.1beta:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:6.1beta:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.1beta:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:6.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.3.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:6.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5.1:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:6.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.2:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.3:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.4:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.5:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.6:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.10.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.7:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.10.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.8:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.1.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.11.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12.2:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.14:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.14.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15.1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.15.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15.3:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.16.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.16.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.16.3:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.16.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.16.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.16.4:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.17:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.18:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.19.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.19.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.19.3:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.2:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.2.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.3:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4.2:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5.1:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5.2:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.6:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.6.1:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.1:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.2:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.3:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8.1:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8.2:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.1:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.2:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.3:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.4:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.5:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.6:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.9.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.7:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.8:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:5.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:5.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:5.11:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.1:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.2:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.3:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13.1:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13.2:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.14:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.14.1:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.1:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.2:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.15.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.3:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.16.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.16.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.16.3:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.19.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:libcurl:7.19.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.19.3:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-0037
reference_id CVE-2009-0037
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2009-0037
119
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/32834.txt
reference_id CVE-2009-0037;OSVDB-53572
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/32834.txt
120
reference_url https://www.securityfocus.com/bid/33962/info
reference_id CVE-2009-0037;OSVDB-53572
reference_type exploit
scores
url https://www.securityfocus.com/bid/33962/info
121
reference_url https://security.gentoo.org/glsa/200903-21
reference_id GLSA-200903-21
reference_type
scores
url https://security.gentoo.org/glsa/200903-21
122
reference_url https://access.redhat.com/errata/RHSA-2009:0341
reference_id RHSA-2009:0341
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0341
123
reference_url https://usn.ubuntu.com/726-1/
reference_id USN-726-1
reference_type
scores
url https://usn.ubuntu.com/726-1/
fixed_packages
0
url pkg:deb/debian/curl@7.18.2-8.1?distro=trixie
purl pkg:deb/debian/curl@7.18.2-8.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.18.2-8.1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2009-0037
risk_score 10.0
exploitability 2.0
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2f5z-vxsz-yqdv
9
url VCID-2szj-xvgq-pkfr
vulnerability_id VCID-2szj-xvgq-pkfr
summary curl: QUIC certificate check bypass with wolfSSL
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2379.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2379.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2379
reference_id
reference_type
scores
0
value 0.00205
scoring_system epss
scoring_elements 0.42735
published_at 2026-04-16T12:55:00Z
1
value 0.00205
scoring_system epss
scoring_elements 0.42672
published_at 2026-04-02T12:55:00Z
2
value 0.00205
scoring_system epss
scoring_elements 0.42699
published_at 2026-04-04T12:55:00Z
3
value 0.00205
scoring_system epss
scoring_elements 0.42641
published_at 2026-04-07T12:55:00Z
4
value 0.00205
scoring_system epss
scoring_elements 0.42692
published_at 2026-04-08T12:55:00Z
5
value 0.00205
scoring_system epss
scoring_elements 0.42704
published_at 2026-04-09T12:55:00Z
6
value 0.00205
scoring_system epss
scoring_elements 0.42726
published_at 2026-04-11T12:55:00Z
7
value 0.00205
scoring_system epss
scoring_elements 0.42691
published_at 2026-04-12T12:55:00Z
8
value 0.00205
scoring_system epss
scoring_elements 0.42674
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2379
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2379
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2379
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://seclists.org/fulldisclosure/2024/Jul/18
reference_id 18
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/
url http://seclists.org/fulldisclosure/2024/Jul/18
5
reference_url http://seclists.org/fulldisclosure/2024/Jul/19
reference_id 19
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/
url http://seclists.org/fulldisclosure/2024/Jul/19
6
reference_url http://www.openwall.com/lists/oss-security/2024/03/27/2
reference_id 2
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/
url http://www.openwall.com/lists/oss-security/2024/03/27/2
7
reference_url http://seclists.org/fulldisclosure/2024/Jul/20
reference_id 20
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/
url http://seclists.org/fulldisclosure/2024/Jul/20
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270499
reference_id 2270499
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270499
9
reference_url https://hackerone.com/reports/2410774
reference_id 2410774
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/
url https://hackerone.com/reports/2410774
10
reference_url https://curl.se/docs/CVE-2024-2379.html
reference_id CVE-2024-2379.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/
url https://curl.se/docs/CVE-2024-2379.html
11
reference_url https://curl.se/docs/CVE-2024-2379.json
reference_id CVE-2024-2379.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/
url https://curl.se/docs/CVE-2024-2379.json
12
reference_url https://support.apple.com/kb/HT214118
reference_id HT214118
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/
url https://support.apple.com/kb/HT214118
13
reference_url https://support.apple.com/kb/HT214119
reference_id HT214119
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/
url https://support.apple.com/kb/HT214119
14
reference_url https://support.apple.com/kb/HT214120
reference_id HT214120
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/
url https://support.apple.com/kb/HT214120
15
reference_url https://security.netapp.com/advisory/ntap-20240531-0001/
reference_id ntap-20240531-0001
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/
url https://security.netapp.com/advisory/ntap-20240531-0001/
16
reference_url https://access.redhat.com/errata/RHSA-2024:2693
reference_id RHSA-2024:2693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2693
17
reference_url https://access.redhat.com/errata/RHSA-2024:2694
reference_id RHSA-2024:2694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2694
fixed_packages
0
url pkg:deb/debian/curl@8.7.1-1?distro=trixie
purl pkg:deb/debian/curl@8.7.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.7.1-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
2
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2024-2379
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2szj-xvgq-pkfr
10
url VCID-2vwu-y316-gbb2
vulnerability_id VCID-2vwu-y316-gbb2
summary Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2466.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2466.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2466
reference_id
reference_type
scores
0
value 0.00149
scoring_system epss
scoring_elements 0.35479
published_at 2026-04-16T12:55:00Z
1
value 0.00149
scoring_system epss
scoring_elements 0.35517
published_at 2026-04-02T12:55:00Z
2
value 0.00149
scoring_system epss
scoring_elements 0.35542
published_at 2026-04-04T12:55:00Z
3
value 0.00149
scoring_system epss
scoring_elements 0.35424
published_at 2026-04-07T12:55:00Z
4
value 0.00149
scoring_system epss
scoring_elements 0.3547
published_at 2026-04-08T12:55:00Z
5
value 0.00149
scoring_system epss
scoring_elements 0.35495
published_at 2026-04-09T12:55:00Z
6
value 0.00149
scoring_system epss
scoring_elements 0.35505
published_at 2026-04-11T12:55:00Z
7
value 0.00149
scoring_system epss
scoring_elements 0.35462
published_at 2026-04-12T12:55:00Z
8
value 0.00149
scoring_system epss
scoring_elements 0.3544
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2466
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://seclists.org/fulldisclosure/2024/Jul/18
reference_id 18
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/
url http://seclists.org/fulldisclosure/2024/Jul/18
4
reference_url http://seclists.org/fulldisclosure/2024/Jul/19
reference_id 19
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/
url http://seclists.org/fulldisclosure/2024/Jul/19
5
reference_url http://seclists.org/fulldisclosure/2024/Jul/20
reference_id 20
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/
url http://seclists.org/fulldisclosure/2024/Jul/20
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270497
reference_id 2270497
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270497
7
reference_url https://hackerone.com/reports/2416725
reference_id 2416725
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/
url https://hackerone.com/reports/2416725
8
reference_url https://curl.se/docs/CVE-2024-2466.html
reference_id CVE-2024-2466.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Medium
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/
url https://curl.se/docs/CVE-2024-2466.html
9
reference_url https://curl.se/docs/CVE-2024-2466.json
reference_id CVE-2024-2466.json
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/
url https://curl.se/docs/CVE-2024-2466.json
10
reference_url https://security.gentoo.org/glsa/202409-20
reference_id GLSA-202409-20
reference_type
scores
url https://security.gentoo.org/glsa/202409-20
11
reference_url https://support.apple.com/kb/HT214118
reference_id HT214118
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/
url https://support.apple.com/kb/HT214118
12
reference_url https://support.apple.com/kb/HT214119
reference_id HT214119
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/
url https://support.apple.com/kb/HT214119
13
reference_url https://support.apple.com/kb/HT214120
reference_id HT214120
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/
url https://support.apple.com/kb/HT214120
14
reference_url https://security.netapp.com/advisory/ntap-20240503-0010/
reference_id ntap-20240503-0010
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/
url https://security.netapp.com/advisory/ntap-20240503-0010/
15
reference_url https://access.redhat.com/errata/RHSA-2024:2693
reference_id RHSA-2024:2693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2693
16
reference_url https://access.redhat.com/errata/RHSA-2024:2694
reference_id RHSA-2024:2694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2694
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.7.1-1?distro=trixie
purl pkg:deb/debian/curl@8.7.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.7.1-1%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2024-2466
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2vwu-y316-gbb2
11
url VCID-2xmp-jc8v-bucb
vulnerability_id VCID-2xmp-jc8v-bucb
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35252.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35252.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-35252
reference_id
reference_type
scores
0
value 0.00212
scoring_system epss
scoring_elements 0.43804
published_at 2026-04-04T12:55:00Z
1
value 0.00212
scoring_system epss
scoring_elements 0.43787
published_at 2026-04-08T12:55:00Z
2
value 0.00212
scoring_system epss
scoring_elements 0.43779
published_at 2026-04-02T12:55:00Z
3
value 0.00212
scoring_system epss
scoring_elements 0.43736
published_at 2026-04-07T12:55:00Z
4
value 0.00289
scoring_system epss
scoring_elements 0.52356
published_at 2026-04-16T12:55:00Z
5
value 0.00289
scoring_system epss
scoring_elements 0.52298
published_at 2026-04-09T12:55:00Z
6
value 0.00289
scoring_system epss
scoring_elements 0.52348
published_at 2026-04-11T12:55:00Z
7
value 0.00289
scoring_system epss
scoring_elements 0.52332
published_at 2026-04-12T12:55:00Z
8
value 0.00289
scoring_system epss
scoring_elements 0.52318
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-35252
2
reference_url https://curl.se/docs/CVE-2022-35252.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-35252.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35252
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35252
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1613943
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/
url https://hackerone.com/reports/1613943
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018831
reference_id 1018831
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018831
7
reference_url http://seclists.org/fulldisclosure/2023/Jan/20
reference_id 20
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/
url http://seclists.org/fulldisclosure/2023/Jan/20
8
reference_url http://seclists.org/fulldisclosure/2023/Jan/21
reference_id 21
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/
url http://seclists.org/fulldisclosure/2023/Jan/21
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2120718
reference_id 2120718
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2120718
10
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/
url https://security.gentoo.org/glsa/202212-01
11
reference_url https://support.apple.com/kb/HT213603
reference_id HT213603
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/
url https://support.apple.com/kb/HT213603
12
reference_url https://support.apple.com/kb/HT213604
reference_id HT213604
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/
url https://support.apple.com/kb/HT213604
13
reference_url https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/
url https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html
14
reference_url https://security.netapp.com/advisory/ntap-20220930-0005/
reference_id ntap-20220930-0005
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/
url https://security.netapp.com/advisory/ntap-20220930-0005/
15
reference_url https://access.redhat.com/errata/RHSA-2022:8840
reference_id RHSA-2022:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8840
16
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
17
reference_url https://access.redhat.com/errata/RHSA-2023:2478
reference_id RHSA-2023:2478
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2478
18
reference_url https://access.redhat.com/errata/RHSA-2023:2963
reference_id RHSA-2023:2963
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2963
19
reference_url https://access.redhat.com/errata/RHSA-2024:0428
reference_id RHSA-2024:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0428
20
reference_url https://usn.ubuntu.com/5587-1/
reference_id USN-5587-1
reference_type
scores
url https://usn.ubuntu.com/5587-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u3%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.85.0-1?distro=trixie
purl pkg:deb/debian/curl@7.85.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.85.0-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2022-35252
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2xmp-jc8v-bucb
12
url VCID-36n6-qanf-nue8
vulnerability_id VCID-36n6-qanf-nue8
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may allow attackers to bypass intended restrictions.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7468.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7468.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7468
reference_id
reference_type
scores
0
value 0.00502
scoring_system epss
scoring_elements 0.65949
published_at 2026-04-01T12:55:00Z
1
value 0.00502
scoring_system epss
scoring_elements 0.66059
published_at 2026-04-16T12:55:00Z
2
value 0.00502
scoring_system epss
scoring_elements 0.65991
published_at 2026-04-02T12:55:00Z
3
value 0.00502
scoring_system epss
scoring_elements 0.66019
published_at 2026-04-04T12:55:00Z
4
value 0.00502
scoring_system epss
scoring_elements 0.65986
published_at 2026-04-07T12:55:00Z
5
value 0.00502
scoring_system epss
scoring_elements 0.66036
published_at 2026-04-08T12:55:00Z
6
value 0.00502
scoring_system epss
scoring_elements 0.66048
published_at 2026-04-09T12:55:00Z
7
value 0.00502
scoring_system epss
scoring_elements 0.66067
published_at 2026-04-11T12:55:00Z
8
value 0.00502
scoring_system epss
scoring_elements 0.66054
published_at 2026-04-12T12:55:00Z
9
value 0.00502
scoring_system epss
scoring_elements 0.66024
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7468
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7468
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7468
3
reference_url https://curl.haxx.se/docs/adv_20170419.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_20170419.html
4
reference_url https://curl.se/docs/CVE-2017-7468.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2017-7468.html
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7468
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7468
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url http://www.securityfocus.com/bid/97962
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97962
8
reference_url http://www.securitytracker.com/id/1038341
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038341
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443381
reference_id 1443381
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443381
10
reference_url https://security.archlinux.org/ASA-201704-12
reference_id ASA-201704-12
reference_type
scores
url https://security.archlinux.org/ASA-201704-12
11
reference_url https://security.archlinux.org/AVG-180
reference_id AVG-180
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-180
12
reference_url https://security.archlinux.org/AVG-181
reference_id AVG-181
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-181
13
reference_url https://security.archlinux.org/AVG-183
reference_id AVG-183
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-183
14
reference_url https://security.archlinux.org/AVG-184
reference_id AVG-184
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-184
15
reference_url https://security.archlinux.org/AVG-241
reference_id AVG-241
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-241
16
reference_url https://security.archlinux.org/AVG-243
reference_id AVG-243
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-243
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7468
reference_id CVE-2017-7468
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
2
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-7468
19
reference_url https://security.gentoo.org/glsa/201709-14
reference_id GLSA-201709-14
reference_type
scores
url https://security.gentoo.org/glsa/201709-14
20
reference_url https://usn.ubuntu.com/3262-1/
reference_id USN-3262-1
reference_type
scores
url https://usn.ubuntu.com/3262-1/
fixed_packages
0
url pkg:deb/debian/curl@7.52.1-5?distro=trixie
purl pkg:deb/debian/curl@7.52.1-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.52.1-5%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2017-7468
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-36n6-qanf-nue8
13
url VCID-38mv-usbe-z7hd
vulnerability_id VCID-38mv-usbe-z7hd
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22901.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22901.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22901
reference_id
reference_type
scores
0
value 0.00344
scoring_system epss
scoring_elements 0.56921
published_at 2026-04-01T12:55:00Z
1
value 0.00344
scoring_system epss
scoring_elements 0.57065
published_at 2026-04-16T12:55:00Z
2
value 0.00344
scoring_system epss
scoring_elements 0.57068
published_at 2026-04-08T12:55:00Z
3
value 0.00344
scoring_system epss
scoring_elements 0.5707
published_at 2026-04-09T12:55:00Z
4
value 0.00344
scoring_system epss
scoring_elements 0.57081
published_at 2026-04-11T12:55:00Z
5
value 0.00344
scoring_system epss
scoring_elements 0.5706
published_at 2026-04-12T12:55:00Z
6
value 0.00344
scoring_system epss
scoring_elements 0.57036
published_at 2026-04-13T12:55:00Z
7
value 0.00344
scoring_system epss
scoring_elements 0.57018
published_at 2026-04-02T12:55:00Z
8
value 0.00344
scoring_system epss
scoring_elements 0.5704
published_at 2026-04-04T12:55:00Z
9
value 0.00344
scoring_system epss
scoring_elements 0.57017
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22901
2
reference_url https://curl.se/docs/CVE-2021-22901.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22901.html
3
reference_url https://hackerone.com/reports/1180380
reference_id
reference_type
scores
url https://hackerone.com/reports/1180380
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1963146
reference_id 1963146
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1963146
5
reference_url https://security.archlinux.org/ASA-202106-4
reference_id ASA-202106-4
reference_type
scores
url https://security.archlinux.org/ASA-202106-4
6
reference_url https://security.archlinux.org/ASA-202106-5
reference_id ASA-202106-5
reference_type
scores
url https://security.archlinux.org/ASA-202106-5
7
reference_url https://security.archlinux.org/ASA-202106-6
reference_id ASA-202106-6
reference_type
scores
url https://security.archlinux.org/ASA-202106-6
8
reference_url https://security.archlinux.org/ASA-202106-7
reference_id ASA-202106-7
reference_type
scores
url https://security.archlinux.org/ASA-202106-7
9
reference_url https://security.archlinux.org/AVG-1995
reference_id AVG-1995
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1995
10
reference_url https://security.archlinux.org/AVG-1996
reference_id AVG-1996
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1996
11
reference_url https://security.archlinux.org/AVG-1997
reference_id AVG-1997
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1997
12
reference_url https://security.archlinux.org/AVG-1998
reference_id AVG-1998
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1998
13
reference_url https://security.gentoo.org/glsa/202105-36
reference_id GLSA-202105-36
reference_type
scores
url https://security.gentoo.org/glsa/202105-36
14
reference_url https://access.redhat.com/errata/RHSA-2021:2471
reference_id RHSA-2021:2471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2471
15
reference_url https://access.redhat.com/errata/RHSA-2021:2472
reference_id RHSA-2021:2472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2472
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2021-22901
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-38mv-usbe-z7hd
14
url VCID-3sy2-4f3g-zkac
vulnerability_id VCID-3sy2-4f3g-zkac
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27774.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27774.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27774
reference_id
reference_type
scores
0
value 0.00306
scoring_system epss
scoring_elements 0.53851
published_at 2026-04-16T12:55:00Z
1
value 0.00306
scoring_system epss
scoring_elements 0.53847
published_at 2026-04-11T12:55:00Z
2
value 0.00306
scoring_system epss
scoring_elements 0.5383
published_at 2026-04-12T12:55:00Z
3
value 0.00306
scoring_system epss
scoring_elements 0.53814
published_at 2026-04-13T12:55:00Z
4
value 0.00306
scoring_system epss
scoring_elements 0.53749
published_at 2026-04-02T12:55:00Z
5
value 0.00306
scoring_system epss
scoring_elements 0.53775
published_at 2026-04-04T12:55:00Z
6
value 0.00306
scoring_system epss
scoring_elements 0.53748
published_at 2026-04-07T12:55:00Z
7
value 0.00306
scoring_system epss
scoring_elements 0.53801
published_at 2026-04-08T12:55:00Z
8
value 0.00306
scoring_system epss
scoring_elements 0.53799
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27774
2
reference_url https://curl.se/docs/CVE-2022-27774.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-27774.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1543773
reference_id
reference_type
scores
url https://hackerone.com/reports/1543773
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010254
reference_id 1010254
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010254
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2077547
reference_id 2077547
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2077547
22
reference_url https://security.archlinux.org/AVG-2685
reference_id AVG-2685
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2685
23
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
url https://security.gentoo.org/glsa/202212-01
24
reference_url https://access.redhat.com/errata/RHSA-2022:5245
reference_id RHSA-2022:5245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5245
25
reference_url https://access.redhat.com/errata/RHSA-2022:5313
reference_id RHSA-2022:5313
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5313
26
reference_url https://usn.ubuntu.com/5397-1/
reference_id USN-5397-1
reference_type
scores
url https://usn.ubuntu.com/5397-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.83.0-1?distro=trixie
purl pkg:deb/debian/curl@7.83.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.0-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2022-27774
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3sy2-4f3g-zkac
15
url VCID-47qb-2qkw-1qej
vulnerability_id VCID-47qb-2qkw-1qej
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28321.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28321.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28321
reference_id
reference_type
scores
0
value 0.00297
scoring_system epss
scoring_elements 0.53057
published_at 2026-04-16T12:55:00Z
1
value 0.00297
scoring_system epss
scoring_elements 0.52966
published_at 2026-04-02T12:55:00Z
2
value 0.00297
scoring_system epss
scoring_elements 0.52991
published_at 2026-04-04T12:55:00Z
3
value 0.00297
scoring_system epss
scoring_elements 0.52959
published_at 2026-04-07T12:55:00Z
4
value 0.00297
scoring_system epss
scoring_elements 0.53009
published_at 2026-04-08T12:55:00Z
5
value 0.00297
scoring_system epss
scoring_elements 0.53003
published_at 2026-04-09T12:55:00Z
6
value 0.00297
scoring_system epss
scoring_elements 0.53052
published_at 2026-04-11T12:55:00Z
7
value 0.00297
scoring_system epss
scoring_elements 0.53037
published_at 2026-04-12T12:55:00Z
8
value 0.00297
scoring_system epss
scoring_elements 0.5302
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28321
2
reference_url https://curl.se/docs/CVE-2023-28321.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-28321.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1950627
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://hackerone.com/reports/1950627
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239
reference_id 1036239
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2196786
reference_id 2196786
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2196786
8
reference_url http://seclists.org/fulldisclosure/2023/Jul/47
reference_id 47
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url http://seclists.org/fulldisclosure/2023/Jul/47
9
reference_url http://seclists.org/fulldisclosure/2023/Jul/48
reference_id 48
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url http://seclists.org/fulldisclosure/2023/Jul/48
10
reference_url http://seclists.org/fulldisclosure/2023/Jul/52
reference_id 52
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url http://seclists.org/fulldisclosure/2023/Jul/52
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
reference_id F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
12
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://security.gentoo.org/glsa/202310-12
13
reference_url https://support.apple.com/kb/HT213843
reference_id HT213843
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://support.apple.com/kb/HT213843
14
reference_url https://support.apple.com/kb/HT213844
reference_id HT213844
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://support.apple.com/kb/HT213844
15
reference_url https://support.apple.com/kb/HT213845
reference_id HT213845
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://support.apple.com/kb/HT213845
16
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html
reference_id msg00016.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html
17
reference_url https://security.netapp.com/advisory/ntap-20230609-0009/
reference_id ntap-20230609-0009
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://security.netapp.com/advisory/ntap-20230609-0009/
18
reference_url https://access.redhat.com/errata/RHSA-2023:4354
reference_id RHSA-2023:4354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4354
19
reference_url https://access.redhat.com/errata/RHSA-2023:4523
reference_id RHSA-2023:4523
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4523
20
reference_url https://access.redhat.com/errata/RHSA-2023:4628
reference_id RHSA-2023:4628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4628
21
reference_url https://access.redhat.com/errata/RHSA-2023:4629
reference_id RHSA-2023:4629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4629
22
reference_url https://access.redhat.com/errata/RHSA-2023:5598
reference_id RHSA-2023:5598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5598
23
reference_url https://access.redhat.com/errata/RHSA-2023:6292
reference_id RHSA-2023:6292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6292
24
reference_url https://usn.ubuntu.com/6237-1/
reference_id USN-6237-1
reference_type
scores
url https://usn.ubuntu.com/6237-1/
25
reference_url https://usn.ubuntu.com/6237-3/
reference_id USN-6237-3
reference_type
scores
url https://usn.ubuntu.com/6237-3/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
reference_id Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u9?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u9%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2023-28321
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-47qb-2qkw-1qej
16
url VCID-4drq-2td7-akbk
vulnerability_id VCID-4drq-2td7-akbk
summary
cURL is vulnerable to a buffer overflow which could lead to the execution
    of arbitrary code.
references
0
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt
1
reference_url http://docs.info.apple.com/article.html?artnum=302847
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=302847
2
reference_url http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html
reference_id
reference_type
scores
url http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3185.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3185.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3185
reference_id
reference_type
scores
0
value 0.04852
scoring_system epss
scoring_elements 0.89553
published_at 2026-04-16T12:55:00Z
1
value 0.04852
scoring_system epss
scoring_elements 0.89504
published_at 2026-04-01T12:55:00Z
2
value 0.04852
scoring_system epss
scoring_elements 0.89547
published_at 2026-04-11T12:55:00Z
3
value 0.04852
scoring_system epss
scoring_elements 0.89544
published_at 2026-04-12T12:55:00Z
4
value 0.04852
scoring_system epss
scoring_elements 0.89508
published_at 2026-04-02T12:55:00Z
5
value 0.04852
scoring_system epss
scoring_elements 0.89519
published_at 2026-04-04T12:55:00Z
6
value 0.04852
scoring_system epss
scoring_elements 0.8952
published_at 2026-04-07T12:55:00Z
7
value 0.04852
scoring_system epss
scoring_elements 0.89536
published_at 2026-04-08T12:55:00Z
8
value 0.04852
scoring_system epss
scoring_elements 0.89539
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3185
5
reference_url https://curl.se/docs/CVE-2005-3185.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2005-3185.html
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185
7
reference_url http://secunia.com/advisories/17192
reference_id
reference_type
scores
url http://secunia.com/advisories/17192
8
reference_url http://secunia.com/advisories/17193
reference_id
reference_type
scores
url http://secunia.com/advisories/17193
9
reference_url http://secunia.com/advisories/17203
reference_id
reference_type
scores
url http://secunia.com/advisories/17203
10
reference_url http://secunia.com/advisories/17208
reference_id
reference_type
scores
url http://secunia.com/advisories/17208
11
reference_url http://secunia.com/advisories/17228
reference_id
reference_type
scores
url http://secunia.com/advisories/17228
12
reference_url http://secunia.com/advisories/17247
reference_id
reference_type
scores
url http://secunia.com/advisories/17247
13
reference_url http://secunia.com/advisories/17297
reference_id
reference_type
scores
url http://secunia.com/advisories/17297
14
reference_url http://secunia.com/advisories/17320
reference_id
reference_type
scores
url http://secunia.com/advisories/17320
15
reference_url http://secunia.com/advisories/17400
reference_id
reference_type
scores
url http://secunia.com/advisories/17400
16
reference_url http://secunia.com/advisories/17403
reference_id
reference_type
scores
url http://secunia.com/advisories/17403
17
reference_url http://secunia.com/advisories/17485
reference_id
reference_type
scores
url http://secunia.com/advisories/17485
18
reference_url http://secunia.com/advisories/17813
reference_id
reference_type
scores
url http://secunia.com/advisories/17813
19
reference_url http://secunia.com/advisories/17965
reference_id
reference_type
scores
url http://secunia.com/advisories/17965
20
reference_url http://secunia.com/advisories/19193
reference_id
reference_type
scores
url http://secunia.com/advisories/19193
21
reference_url http://securityreason.com/securityalert/82
reference_id
reference_type
scores
url http://securityreason.com/securityalert/82
22
reference_url http://securitytracker.com/id?1015056
reference_id
reference_type
scores
url http://securitytracker.com/id?1015056
23
reference_url http://securitytracker.com/id?1015057
reference_id
reference_type
scores
url http://securitytracker.com/id?1015057
24
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/22721
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/22721
25
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.519010
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.519010
26
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810
27
reference_url http://www.debian.org/security/2005/dsa-919
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-919
28
reference_url http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml
29
reference_url http://www.idefense.com/application/poi/display?id=322&type=vulnerabilities
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=322&type=vulnerabilities
30
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:182
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:182
31
reference_url http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html
32
reference_url http://www.osvdb.org/20011
reference_id
reference_type
scores
url http://www.osvdb.org/20011
33
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html
34
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2005-807.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-807.html
36
reference_url http://www.redhat.com/support/errata/RHSA-2005-812.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-812.html
37
reference_url http://www.securityfocus.com/bid/15102
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15102
38
reference_url http://www.securityfocus.com/bid/15647
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15647
39
reference_url http://www.vupen.com/english/advisories/2005/2088
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2088
40
reference_url http://www.vupen.com/english/advisories/2005/2125
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2125
41
reference_url http://www.vupen.com/english/advisories/2005/2659
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2659
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617794
reference_id 1617794
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617794
43
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=333734
reference_id 333734
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=333734
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libcurl:libcurl:7.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libcurl:libcurl:7.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libcurl:libcurl:7.13.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wget:wget:1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wget:wget:1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wget:wget:1.10:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3185
reference_id CVE-2005-3185
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-3185
48
reference_url https://security.gentoo.org/glsa/200510-19
reference_id GLSA-200510-19
reference_type
scores
url https://security.gentoo.org/glsa/200510-19
49
reference_url https://access.redhat.com/errata/RHSA-2005:807
reference_id RHSA-2005:807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:807
50
reference_url https://access.redhat.com/errata/RHSA-2005:812
reference_id RHSA-2005:812
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:812
51
reference_url https://usn.ubuntu.com/205-1/
reference_id USN-205-1
reference_type
scores
url https://usn.ubuntu.com/205-1/
fixed_packages
0
url pkg:deb/debian/curl@7.15.0-1?distro=trixie
purl pkg:deb/debian/curl@7.15.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.15.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2005-3185
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4drq-2td7-akbk
17
url VCID-4e1k-7bj9-hfch
vulnerability_id VCID-4e1k-7bj9-hfch
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23914.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23914.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23914
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.31922
published_at 2026-04-13T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.32048
published_at 2026-04-02T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.32088
published_at 2026-04-04T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.31911
published_at 2026-04-07T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.31963
published_at 2026-04-08T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.31992
published_at 2026-04-09T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31995
published_at 2026-04-11T12:55:00Z
7
value 0.00126
scoring_system epss
scoring_elements 0.31955
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23914
2
reference_url https://curl.se/docs/CVE-2023-23914.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-23914.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23914
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23914
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1813864
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-03-12T18:51:37Z/
url https://hackerone.com/reports/1813864
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031371
reference_id 1031371
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031371
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2167797
reference_id 2167797
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2167797
8
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-03-12T18:51:37Z/
url https://security.gentoo.org/glsa/202310-12
9
reference_url https://security.netapp.com/advisory/ntap-20230309-0006/
reference_id ntap-20230309-0006
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-03-12T18:51:37Z/
url https://security.netapp.com/advisory/ntap-20230309-0006/
10
reference_url https://access.redhat.com/errata/RHSA-2023:3354
reference_id RHSA-2023:3354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3354
11
reference_url https://access.redhat.com/errata/RHSA-2023:3355
reference_id RHSA-2023:3355
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3355
12
reference_url https://usn.ubuntu.com/5891-1/
reference_id USN-5891-1
reference_type
scores
url https://usn.ubuntu.com/5891-1/
fixed_packages
0
url pkg:deb/debian/curl@7.88.1-1?distro=trixie
purl pkg:deb/debian/curl@7.88.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
2
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2023-23914
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4e1k-7bj9-hfch
18
url VCID-4gze-cwtp-2bgr
vulnerability_id VCID-4gze-cwtp-2bgr
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23915.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23915.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23915
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13754
published_at 2026-04-16T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13978
published_at 2026-04-02T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.14033
published_at 2026-04-04T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13836
published_at 2026-04-07T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.1392
published_at 2026-04-08T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13973
published_at 2026-04-09T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.1393
published_at 2026-04-11T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13894
published_at 2026-04-12T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13846
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23915
2
reference_url https://curl.se/docs/CVE-2023-23915.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-23915.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23915
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1814333
reference_id
reference_type
scores
url https://hackerone.com/reports/1814333
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031371
reference_id 1031371
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031371
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2167813
reference_id 2167813
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2167813
8
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:46:29Z/
url https://security.gentoo.org/glsa/202310-12
9
reference_url https://security.netapp.com/advisory/ntap-20230309-0006/
reference_id ntap-20230309-0006
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:46:29Z/
url https://security.netapp.com/advisory/ntap-20230309-0006/
10
reference_url https://access.redhat.com/errata/RHSA-2023:3354
reference_id RHSA-2023:3354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3354
11
reference_url https://access.redhat.com/errata/RHSA-2023:3355
reference_id RHSA-2023:3355
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3355
12
reference_url https://usn.ubuntu.com/5891-1/
reference_id USN-5891-1
reference_type
scores
url https://usn.ubuntu.com/5891-1/
fixed_packages
0
url pkg:deb/debian/curl@7.88.1-1?distro=trixie
purl pkg:deb/debian/curl@7.88.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
2
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2023-23915
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4gze-cwtp-2bgr
19
url VCID-4mcy-vzmg-mbhz
vulnerability_id VCID-4mcy-vzmg-mbhz
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which might allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0036.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0036.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0036
reference_id
reference_type
scores
0
value 0.10342
scoring_system epss
scoring_elements 0.93204
published_at 2026-04-16T12:55:00Z
1
value 0.10342
scoring_system epss
scoring_elements 0.93159
published_at 2026-04-01T12:55:00Z
2
value 0.10342
scoring_system epss
scoring_elements 0.93168
published_at 2026-04-02T12:55:00Z
3
value 0.10342
scoring_system epss
scoring_elements 0.93173
published_at 2026-04-04T12:55:00Z
4
value 0.10342
scoring_system epss
scoring_elements 0.93171
published_at 2026-04-07T12:55:00Z
5
value 0.10342
scoring_system epss
scoring_elements 0.93179
published_at 2026-04-08T12:55:00Z
6
value 0.10342
scoring_system epss
scoring_elements 0.93184
published_at 2026-04-09T12:55:00Z
7
value 0.10342
scoring_system epss
scoring_elements 0.93189
published_at 2026-04-11T12:55:00Z
8
value 0.10342
scoring_system epss
scoring_elements 0.93187
published_at 2026-04-12T12:55:00Z
9
value 0.10342
scoring_system epss
scoring_elements 0.93188
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0036
2
reference_url https://curl.se/docs/CVE-2012-0036.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2012-0036.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0036
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=773457
reference_id 773457
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=773457
5
reference_url https://security.gentoo.org/glsa/201203-02
reference_id GLSA-201203-02
reference_type
scores
url https://security.gentoo.org/glsa/201203-02
6
reference_url https://usn.ubuntu.com/1346-1/
reference_id USN-1346-1
reference_type
scores
url https://usn.ubuntu.com/1346-1/
fixed_packages
0
url pkg:deb/debian/curl@7.24.0-1?distro=trixie
purl pkg:deb/debian/curl@7.24.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.24.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2012-0036
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4mcy-vzmg-mbhz
20
url VCID-4mk9-5buz-puh5
vulnerability_id VCID-4mk9-5buz-puh5
summary
Multiple vulnerabilities have been discovered in cURL, the worst of
    which could lead to man-in-the-middle attacks.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0139.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0139.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0139
reference_id
reference_type
scores
0
value 0.01203
scoring_system epss
scoring_elements 0.7896
published_at 2026-04-16T12:55:00Z
1
value 0.01203
scoring_system epss
scoring_elements 0.78884
published_at 2026-04-01T12:55:00Z
2
value 0.01203
scoring_system epss
scoring_elements 0.78891
published_at 2026-04-02T12:55:00Z
3
value 0.01203
scoring_system epss
scoring_elements 0.78919
published_at 2026-04-04T12:55:00Z
4
value 0.01203
scoring_system epss
scoring_elements 0.78902
published_at 2026-04-07T12:55:00Z
5
value 0.01203
scoring_system epss
scoring_elements 0.78927
published_at 2026-04-08T12:55:00Z
6
value 0.01203
scoring_system epss
scoring_elements 0.78933
published_at 2026-04-09T12:55:00Z
7
value 0.01203
scoring_system epss
scoring_elements 0.78956
published_at 2026-04-11T12:55:00Z
8
value 0.01203
scoring_system epss
scoring_elements 0.78941
published_at 2026-04-12T12:55:00Z
9
value 0.01203
scoring_system epss
scoring_elements 0.78931
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0139
2
reference_url https://curl.se/docs/CVE-2014-0139.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2014-0139.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1079149
reference_id 1079149
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1079149
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742728
reference_id 742728
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742728
7
reference_url https://security.gentoo.org/glsa/201406-21
reference_id GLSA-201406-21
reference_type
scores
url https://security.gentoo.org/glsa/201406-21
8
reference_url https://usn.ubuntu.com/2167-1/
reference_id USN-2167-1
reference_type
scores
url https://usn.ubuntu.com/2167-1/
fixed_packages
0
url pkg:deb/debian/curl@7.36.0-1?distro=trixie
purl pkg:deb/debian/curl@7.36.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.36.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2014-0139
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4mk9-5buz-puh5
21
url VCID-4seq-hvbx-7fg8
vulnerability_id VCID-4seq-hvbx-7fg8
summary Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46219.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46219.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46219
reference_id
reference_type
scores
0
value 0.00203
scoring_system epss
scoring_elements 0.42459
published_at 2026-04-16T12:55:00Z
1
value 0.00203
scoring_system epss
scoring_elements 0.42478
published_at 2026-04-11T12:55:00Z
2
value 0.00203
scoring_system epss
scoring_elements 0.4244
published_at 2026-04-12T12:55:00Z
3
value 0.00203
scoring_system epss
scoring_elements 0.4241
published_at 2026-04-13T12:55:00Z
4
value 0.00221
scoring_system epss
scoring_elements 0.4466
published_at 2026-04-07T12:55:00Z
5
value 0.00221
scoring_system epss
scoring_elements 0.44703
published_at 2026-04-02T12:55:00Z
6
value 0.00221
scoring_system epss
scoring_elements 0.44716
published_at 2026-04-09T12:55:00Z
7
value 0.00221
scoring_system epss
scoring_elements 0.44713
published_at 2026-04-08T12:55:00Z
8
value 0.00221
scoring_system epss
scoring_elements 0.44723
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46219
2
reference_url https://curl.se/docs/CVE-2023-46219.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:01:11Z/
url https://curl.se/docs/CVE-2023-46219.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46219
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/2236133
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:01:11Z/
url https://hackerone.com/reports/2236133
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057645
reference_id 1057645
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057645
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2252034
reference_id 2252034
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2252034
8
reference_url https://www.debian.org/security/2023/dsa-5587
reference_id dsa-5587
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:01:11Z/
url https://www.debian.org/security/2023/dsa-5587
9
reference_url https://security.gentoo.org/glsa/202409-20
reference_id GLSA-202409-20
reference_type
scores
url https://security.gentoo.org/glsa/202409-20
10
reference_url https://security.netapp.com/advisory/ntap-20240119-0007/
reference_id ntap-20240119-0007
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:01:11Z/
url https://security.netapp.com/advisory/ntap-20240119-0007/
11
reference_url https://access.redhat.com/errata/RHSA-2024:1316
reference_id RHSA-2024:1316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1316
12
reference_url https://access.redhat.com/errata/RHSA-2024:1317
reference_id RHSA-2024:1317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1317
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD/
reference_id UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:01:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD/
14
reference_url https://usn.ubuntu.com/6535-1/
reference_id USN-6535-1
reference_type
scores
url https://usn.ubuntu.com/6535-1/
fixed_packages
0
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u5%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
2
url pkg:deb/debian/curl@8.5.0-1?distro=trixie
purl pkg:deb/debian/curl@8.5.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.5.0-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2023-46219
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4seq-hvbx-7fg8
22
url VCID-549m-sm8g-cude
vulnerability_id VCID-549m-sm8g-cude
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may allow attackers to bypass intended restrictions.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000099.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000099.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000099
reference_id
reference_type
scores
0
value 0.00744
scoring_system epss
scoring_elements 0.72962
published_at 2026-04-01T12:55:00Z
1
value 0.00744
scoring_system epss
scoring_elements 0.73061
published_at 2026-04-16T12:55:00Z
2
value 0.00744
scoring_system epss
scoring_elements 0.72974
published_at 2026-04-02T12:55:00Z
3
value 0.00744
scoring_system epss
scoring_elements 0.72994
published_at 2026-04-04T12:55:00Z
4
value 0.00744
scoring_system epss
scoring_elements 0.7297
published_at 2026-04-07T12:55:00Z
5
value 0.00744
scoring_system epss
scoring_elements 0.73007
published_at 2026-04-08T12:55:00Z
6
value 0.00744
scoring_system epss
scoring_elements 0.73021
published_at 2026-04-09T12:55:00Z
7
value 0.00744
scoring_system epss
scoring_elements 0.73046
published_at 2026-04-11T12:55:00Z
8
value 0.00744
scoring_system epss
scoring_elements 0.73025
published_at 2026-04-12T12:55:00Z
9
value 0.00744
scoring_system epss
scoring_elements 0.73019
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000099
2
reference_url https://curl.haxx.se/0809C.patch
reference_id
reference_type
scores
url https://curl.haxx.se/0809C.patch
3
reference_url https://curl.haxx.se/docs/adv_20170809C.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_20170809C.html
4
reference_url https://curl.se/docs/CVE-2017-1000099.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2017-1000099.html
5
reference_url http://www.securityfocus.com/bid/100281
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100281
6
reference_url http://www.securitytracker.com/id/1039119
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039119
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1478316
reference_id 1478316
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1478316
8
reference_url https://security.archlinux.org/ASA-201708-16
reference_id ASA-201708-16
reference_type
scores
url https://security.archlinux.org/ASA-201708-16
9
reference_url https://security.archlinux.org/ASA-201710-3
reference_id ASA-201710-3
reference_type
scores
url https://security.archlinux.org/ASA-201710-3
10
reference_url https://security.archlinux.org/ASA-201710-4
reference_id ASA-201710-4
reference_type
scores
url https://security.archlinux.org/ASA-201710-4
11
reference_url https://security.archlinux.org/ASA-201710-5
reference_id ASA-201710-5
reference_type
scores
url https://security.archlinux.org/ASA-201710-5
12
reference_url https://security.archlinux.org/ASA-201710-6
reference_id ASA-201710-6
reference_type
scores
url https://security.archlinux.org/ASA-201710-6
13
reference_url https://security.archlinux.org/ASA-201710-7
reference_id ASA-201710-7
reference_type
scores
url https://security.archlinux.org/ASA-201710-7
14
reference_url https://security.archlinux.org/AVG-370
reference_id AVG-370
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-370
15
reference_url https://security.archlinux.org/AVG-371
reference_id AVG-371
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-371
16
reference_url https://security.archlinux.org/AVG-386
reference_id AVG-386
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-386
17
reference_url https://security.archlinux.org/AVG-387
reference_id AVG-387
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-387
18
reference_url https://security.archlinux.org/AVG-388
reference_id AVG-388
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-388
19
reference_url https://security.archlinux.org/AVG-389
reference_id AVG-389
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-389
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000099
reference_id CVE-2017-1000099
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000099
22
reference_url https://security.gentoo.org/glsa/201709-14
reference_id GLSA-201709-14
reference_type
scores
url https://security.gentoo.org/glsa/201709-14
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2017-1000099
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-549m-sm8g-cude
23
url VCID-56wg-yafz-gkgx
vulnerability_id VCID-56wg-yafz-gkgx
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22922.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22922.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22922
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.34891
published_at 2026-04-01T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.3505
published_at 2026-04-16T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.35071
published_at 2026-04-11T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.35036
published_at 2026-04-12T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.35012
published_at 2026-04-13T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.35088
published_at 2026-04-02T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.35115
published_at 2026-04-04T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.34995
published_at 2026-04-07T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.35039
published_at 2026-04-08T12:55:00Z
9
value 0.00146
scoring_system epss
scoring_elements 0.35067
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22922
2
reference_url https://curl.se/docs/CVE-2021-22922.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22922.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22922
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22922
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1213175
reference_id
reference_type
scores
url https://hackerone.com/reports/1213175
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1981435
reference_id 1981435
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1981435
7
reference_url https://security.archlinux.org/ASA-202107-59
reference_id ASA-202107-59
reference_type
scores
url https://security.archlinux.org/ASA-202107-59
8
reference_url https://security.archlinux.org/AVG-2194
reference_id AVG-2194
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2194
9
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
url https://security.gentoo.org/glsa/202212-01
10
reference_url https://access.redhat.com/errata/RHSA-2021:3582
reference_id RHSA-2021:3582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3582
11
reference_url https://access.redhat.com/errata/RHSA-2021:3903
reference_id RHSA-2021:3903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3903
fixed_packages
0
url pkg:deb/debian/curl@7.79.1-1?distro=trixie
purl pkg:deb/debian/curl@7.79.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.79.1-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
2
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2021-22922
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-56wg-yafz-gkgx
24
url VCID-5g4v-dyse-uucu
vulnerability_id VCID-5g4v-dyse-uucu
summary wcurl: wcurl: Arbitrary file placement via crafted URLs
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11563.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11563.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11563
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.0412
published_at 2026-04-02T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04108
published_at 2026-04-16T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04186
published_at 2026-04-08T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04201
published_at 2026-04-09T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.0418
published_at 2026-04-11T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04163
published_at 2026-04-12T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04137
published_at 2026-04-13T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04138
published_at 2026-04-04T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04155
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11563
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2442571
reference_id 2442571
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2442571
4
reference_url https://curl.se/docs/CVE-2025-11563.html
reference_id CVE-2025-11563.html
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-25T18:53:51Z/
url https://curl.se/docs/CVE-2025-11563.html
5
reference_url https://curl.se/docs/CVE-2025-11563.json
reference_id CVE-2025-11563.json
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-25T18:53:51Z/
url https://curl.se/docs/CVE-2025-11563.json
6
reference_url https://usn.ubuntu.com/8062-1/
reference_id USN-8062-1
reference_type
scores
url https://usn.ubuntu.com/8062-1/
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.17.0-2?distro=trixie
purl pkg:deb/debian/curl@8.17.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.17.0-2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2025-11563
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5g4v-dyse-uucu
25
url VCID-5jan-pqf6-fyhr
vulnerability_id VCID-5jan-pqf6-fyhr
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8622.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8622.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8622
reference_id
reference_type
scores
0
value 0.01634
scoring_system epss
scoring_elements 0.81845
published_at 2026-04-01T12:55:00Z
1
value 0.01634
scoring_system epss
scoring_elements 0.81947
published_at 2026-04-16T12:55:00Z
2
value 0.01634
scoring_system epss
scoring_elements 0.81901
published_at 2026-04-08T12:55:00Z
3
value 0.01634
scoring_system epss
scoring_elements 0.81908
published_at 2026-04-09T12:55:00Z
4
value 0.01634
scoring_system epss
scoring_elements 0.81927
published_at 2026-04-11T12:55:00Z
5
value 0.01634
scoring_system epss
scoring_elements 0.81915
published_at 2026-04-12T12:55:00Z
6
value 0.01634
scoring_system epss
scoring_elements 0.81911
published_at 2026-04-13T12:55:00Z
7
value 0.01634
scoring_system epss
scoring_elements 0.81856
published_at 2026-04-02T12:55:00Z
8
value 0.01634
scoring_system epss
scoring_elements 0.81879
published_at 2026-04-04T12:55:00Z
9
value 0.01634
scoring_system epss
scoring_elements 0.81875
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8622
2
reference_url https://curl.se/docs/CVE-2016-8622.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8622.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388386
reference_id 1388386
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388386
15
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
16
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
17
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
18
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
19
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
20
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
21
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
22
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:deb/debian/curl@7.51.0-1?distro=trixie
purl pkg:deb/debian/curl@7.51.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-8622
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5jan-pqf6-fyhr
26
url VCID-5n7a-9j23-e7dj
vulnerability_id VCID-5n7a-9j23-e7dj
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16839.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16839.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16839
reference_id
reference_type
scores
0
value 0.00293
scoring_system epss
scoring_elements 0.52577
published_at 2026-04-01T12:55:00Z
1
value 0.00293
scoring_system epss
scoring_elements 0.52647
published_at 2026-04-04T12:55:00Z
2
value 0.00293
scoring_system epss
scoring_elements 0.5262
published_at 2026-04-02T12:55:00Z
3
value 0.00293
scoring_system epss
scoring_elements 0.52613
published_at 2026-04-07T12:55:00Z
4
value 0.00293
scoring_system epss
scoring_elements 0.52664
published_at 2026-04-08T12:55:00Z
5
value 0.00293
scoring_system epss
scoring_elements 0.52659
published_at 2026-04-09T12:55:00Z
6
value 0.00293
scoring_system epss
scoring_elements 0.52709
published_at 2026-04-11T12:55:00Z
7
value 0.00365
scoring_system epss
scoring_elements 0.58495
published_at 2026-04-13T12:55:00Z
8
value 0.00365
scoring_system epss
scoring_elements 0.58527
published_at 2026-04-16T12:55:00Z
9
value 0.00365
scoring_system epss
scoring_elements 0.58515
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16839
2
reference_url https://curl.se/docs/CVE-2018-16839.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-16839.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1642201
reference_id 1642201
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1642201
7
reference_url https://security.archlinux.org/ASA-201811-7
reference_id ASA-201811-7
reference_type
scores
url https://security.archlinux.org/ASA-201811-7
8
reference_url https://security.archlinux.org/ASA-201811-8
reference_id ASA-201811-8
reference_type
scores
url https://security.archlinux.org/ASA-201811-8
9
reference_url https://security.archlinux.org/ASA-201811-9
reference_id ASA-201811-9
reference_type
scores
url https://security.archlinux.org/ASA-201811-9
10
reference_url https://security.archlinux.org/AVG-796
reference_id AVG-796
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-796
11
reference_url https://security.archlinux.org/AVG-797
reference_id AVG-797
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-797
12
reference_url https://security.archlinux.org/AVG-798
reference_id AVG-798
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-798
13
reference_url https://security.gentoo.org/glsa/201903-03
reference_id GLSA-201903-03
reference_type
scores
url https://security.gentoo.org/glsa/201903-03
14
reference_url https://usn.ubuntu.com/3805-1/
reference_id USN-3805-1
reference_type
scores
url https://usn.ubuntu.com/3805-1/
fixed_packages
0
url pkg:deb/debian/curl@7.62.0-1?distro=trixie
purl pkg:deb/debian/curl@7.62.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.62.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2018-16839
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5n7a-9j23-e7dj
27
url VCID-5xp7-mcsa-uqd4
vulnerability_id VCID-5xp7-mcsa-uqd4
summary
When doing TLS related transfers with reused easy or multi handles and
altering the  `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally
reuse a CA store cached in memory for which the partial chain option was
reversed. Contrary to the user's wishes and expectations. This could make
libcurl find and accept a trust chain that it otherwise would not.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14819.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14819.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14819
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13995
published_at 2026-04-02T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13771
published_at 2026-04-16T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13854
published_at 2026-04-07T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13938
published_at 2026-04-08T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13991
published_at 2026-04-09T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13948
published_at 2026-04-11T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13911
published_at 2026-04-12T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13863
published_at 2026-04-13T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.1405
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14819
2
reference_url https://curl.se/docs/CVE-2025-14819.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T15:00:02Z/
url https://curl.se/docs/CVE-2025-14819.html
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2426408
reference_id 2426408
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2426408
5
reference_url https://curl.se/docs/CVE-2025-14819.json
reference_id CVE-2025-14819.json
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T15:00:02Z/
url https://curl.se/docs/CVE-2025-14819.json
6
reference_url https://usn.ubuntu.com/8062-1/
reference_id USN-8062-1
reference_type
scores
url https://usn.ubuntu.com/8062-1/
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@8.18.0~rc3-1?distro=trixie
purl pkg:deb/debian/curl@8.18.0~rc3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.18.0~rc3-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2025-14819
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5xp7-mcsa-uqd4
28
url VCID-6ge5-86tg-dydf
vulnerability_id VCID-6ge5-86tg-dydf
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27779.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27779.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27779
reference_id
reference_type
scores
0
value 0.00273
scoring_system epss
scoring_elements 0.50731
published_at 2026-04-16T12:55:00Z
1
value 0.00273
scoring_system epss
scoring_elements 0.50686
published_at 2026-04-09T12:55:00Z
2
value 0.00273
scoring_system epss
scoring_elements 0.50728
published_at 2026-04-11T12:55:00Z
3
value 0.00273
scoring_system epss
scoring_elements 0.50705
published_at 2026-04-12T12:55:00Z
4
value 0.00273
scoring_system epss
scoring_elements 0.50654
published_at 2026-04-02T12:55:00Z
5
value 0.00273
scoring_system epss
scoring_elements 0.5068
published_at 2026-04-04T12:55:00Z
6
value 0.00273
scoring_system epss
scoring_elements 0.50635
published_at 2026-04-07T12:55:00Z
7
value 0.00273
scoring_system epss
scoring_elements 0.5069
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27779
2
reference_url https://curl.se/docs/CVE-2022-27779.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-27779.html
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://hackerone.com/reports/1553301
reference_id
reference_type
scores
url https://hackerone.com/reports/1553301
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082202
reference_id 2082202
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082202
6
reference_url https://security.archlinux.org/AVG-2706
reference_id AVG-2706
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2706
7
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
url https://security.gentoo.org/glsa/202212-01
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.83.1-1?distro=trixie
purl pkg:deb/debian/curl@7.83.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.1-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2022-27779
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6ge5-86tg-dydf
29
url VCID-6muy-xpdq-9kg8
vulnerability_id VCID-6muy-xpdq-9kg8
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8616.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8616.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8616
reference_id
reference_type
scores
0
value 0.0413
scoring_system epss
scoring_elements 0.88589
published_at 2026-04-01T12:55:00Z
1
value 0.0413
scoring_system epss
scoring_elements 0.88658
published_at 2026-04-16T12:55:00Z
2
value 0.0413
scoring_system epss
scoring_elements 0.88598
published_at 2026-04-02T12:55:00Z
3
value 0.0413
scoring_system epss
scoring_elements 0.88616
published_at 2026-04-04T12:55:00Z
4
value 0.0413
scoring_system epss
scoring_elements 0.88617
published_at 2026-04-07T12:55:00Z
5
value 0.0413
scoring_system epss
scoring_elements 0.88635
published_at 2026-04-08T12:55:00Z
6
value 0.0413
scoring_system epss
scoring_elements 0.8864
published_at 2026-04-09T12:55:00Z
7
value 0.0413
scoring_system epss
scoring_elements 0.88652
published_at 2026-04-11T12:55:00Z
8
value 0.0413
scoring_system epss
scoring_elements 0.88645
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8616
2
reference_url https://curl.se/docs/CVE-2016-8616.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8616.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388371
reference_id 1388371
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388371
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
20
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
21
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
22
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
23
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
24
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
25
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
26
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
27
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
28
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:deb/debian/curl@7.51.0-1?distro=trixie
purl pkg:deb/debian/curl@7.51.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-8616
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6muy-xpdq-9kg8
30
url VCID-6we4-n888-6qhe
vulnerability_id VCID-6we4-n888-6qhe
summary libcurl: Buffer Overflow in libcurl via zlib Integer Overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0725.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0725.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0725
reference_id
reference_type
scores
0
value 0.00442
scoring_system epss
scoring_elements 0.6327
published_at 2026-04-13T12:55:00Z
1
value 0.00442
scoring_system epss
scoring_elements 0.63305
published_at 2026-04-09T12:55:00Z
2
value 0.00442
scoring_system epss
scoring_elements 0.63322
published_at 2026-04-11T12:55:00Z
3
value 0.00442
scoring_system epss
scoring_elements 0.63306
published_at 2026-04-16T12:55:00Z
4
value 0.00454
scoring_system epss
scoring_elements 0.63788
published_at 2026-04-02T12:55:00Z
5
value 0.00454
scoring_system epss
scoring_elements 0.63823
published_at 2026-04-08T12:55:00Z
6
value 0.00454
scoring_system epss
scoring_elements 0.63815
published_at 2026-04-04T12:55:00Z
7
value 0.00454
scoring_system epss
scoring_elements 0.63772
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0725
2
reference_url https://curl.se/docs/CVE-2025-0725.html
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-05T14:33:50Z/
url https://curl.se/docs/CVE-2025-0725.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0725
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/2956023
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-05T14:33:50Z/
url https://hackerone.com/reports/2956023
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2343899
reference_id 2343899
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2343899
7
reference_url https://curl.se/docs/CVE-2025-0725.json
reference_id CVE-2025-0725.json
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-05T14:33:50Z/
url https://curl.se/docs/CVE-2025-0725.json
fixed_packages
0
url pkg:deb/debian/curl@8.12.0%2Bgit20250209.89ed161%2Bds-1?distro=trixie
purl pkg:deb/debian/curl@8.12.0%2Bgit20250209.89ed161%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.12.0%252Bgit20250209.89ed161%252Bds-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
2
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2025-0725
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6we4-n888-6qhe
31
url VCID-6yb7-t8qs-cbch
vulnerability_id VCID-6yb7-t8qs-cbch
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000007.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000007.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000007
reference_id
reference_type
scores
0
value 0.03344
scoring_system epss
scoring_elements 0.87269
published_at 2026-04-02T12:55:00Z
1
value 0.03344
scoring_system epss
scoring_elements 0.87259
published_at 2026-04-01T12:55:00Z
2
value 0.03344
scoring_system epss
scoring_elements 0.87302
published_at 2026-04-08T12:55:00Z
3
value 0.03344
scoring_system epss
scoring_elements 0.87283
published_at 2026-04-07T12:55:00Z
4
value 0.03344
scoring_system epss
scoring_elements 0.87285
published_at 2026-04-04T12:55:00Z
5
value 0.03871
scoring_system epss
scoring_elements 0.88245
published_at 2026-04-16T12:55:00Z
6
value 0.03871
scoring_system epss
scoring_elements 0.88227
published_at 2026-04-09T12:55:00Z
7
value 0.03871
scoring_system epss
scoring_elements 0.88238
published_at 2026-04-11T12:55:00Z
8
value 0.03871
scoring_system epss
scoring_elements 0.88231
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000007
2
reference_url https://curl.se/docs/CVE-2018-1000007.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-1000007.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1537125
reference_id 1537125
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1537125
6
reference_url https://security.archlinux.org/ASA-201801-20
reference_id ASA-201801-20
reference_type
scores
url https://security.archlinux.org/ASA-201801-20
7
reference_url https://security.archlinux.org/ASA-201801-22
reference_id ASA-201801-22
reference_type
scores
url https://security.archlinux.org/ASA-201801-22
8
reference_url https://security.archlinux.org/ASA-201801-23
reference_id ASA-201801-23
reference_type
scores
url https://security.archlinux.org/ASA-201801-23
9
reference_url https://security.archlinux.org/ASA-201801-24
reference_id ASA-201801-24
reference_type
scores
url https://security.archlinux.org/ASA-201801-24
10
reference_url https://security.archlinux.org/ASA-201801-25
reference_id ASA-201801-25
reference_type
scores
url https://security.archlinux.org/ASA-201801-25
11
reference_url https://security.archlinux.org/ASA-201801-26
reference_id ASA-201801-26
reference_type
scores
url https://security.archlinux.org/ASA-201801-26
12
reference_url https://security.archlinux.org/AVG-593
reference_id AVG-593
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-593
13
reference_url https://security.archlinux.org/AVG-594
reference_id AVG-594
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-594
14
reference_url https://security.archlinux.org/AVG-595
reference_id AVG-595
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-595
15
reference_url https://security.archlinux.org/AVG-596
reference_id AVG-596
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-596
16
reference_url https://security.archlinux.org/AVG-597
reference_id AVG-597
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-597
17
reference_url https://security.archlinux.org/AVG-598
reference_id AVG-598
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-598
18
reference_url https://security.gentoo.org/glsa/201804-04
reference_id GLSA-201804-04
reference_type
scores
url https://security.gentoo.org/glsa/201804-04
19
reference_url https://usn.ubuntu.com/3554-1/
reference_id USN-3554-1
reference_type
scores
url https://usn.ubuntu.com/3554-1/
20
reference_url https://usn.ubuntu.com/3554-2/
reference_id USN-3554-2
reference_type
scores
url https://usn.ubuntu.com/3554-2/
fixed_packages
0
url pkg:deb/debian/curl@7.58.0-1?distro=trixie
purl pkg:deb/debian/curl@7.58.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.58.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2018-1000007
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6yb7-t8qs-cbch
32
url VCID-75nw-4e2d-zqgg
vulnerability_id VCID-75nw-4e2d-zqgg
summary curl: libcurl: ASN.1 date parser overread
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7264.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7264.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7264
reference_id
reference_type
scores
0
value 0.00796
scoring_system epss
scoring_elements 0.73947
published_at 2026-04-02T12:55:00Z
1
value 0.00796
scoring_system epss
scoring_elements 0.73978
published_at 2026-04-08T12:55:00Z
2
value 0.00796
scoring_system epss
scoring_elements 0.73943
published_at 2026-04-07T12:55:00Z
3
value 0.00796
scoring_system epss
scoring_elements 0.73973
published_at 2026-04-04T12:55:00Z
4
value 0.00882
scoring_system epss
scoring_elements 0.75437
published_at 2026-04-16T12:55:00Z
5
value 0.00882
scoring_system epss
scoring_elements 0.75409
published_at 2026-04-09T12:55:00Z
6
value 0.00882
scoring_system epss
scoring_elements 0.75429
published_at 2026-04-11T12:55:00Z
7
value 0.00882
scoring_system epss
scoring_elements 0.75407
published_at 2026-04-12T12:55:00Z
8
value 0.00882
scoring_system epss
scoring_elements 0.75396
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7264
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7264
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7264
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2024/07/31/1
reference_id 1
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T20:05:41Z/
url http://www.openwall.com/lists/oss-security/2024/07/31/1
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077656
reference_id 1077656
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077656
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2301888
reference_id 2301888
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2301888
7
reference_url https://hackerone.com/reports/2629968
reference_id 2629968
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T20:05:41Z/
url https://hackerone.com/reports/2629968
8
reference_url https://curl.se/docs/CVE-2024-7264.html
reference_id CVE-2024-7264.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T20:05:41Z/
url https://curl.se/docs/CVE-2024-7264.html
9
reference_url https://curl.se/docs/CVE-2024-7264.json
reference_id CVE-2024-7264.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T20:05:41Z/
url https://curl.se/docs/CVE-2024-7264.json
10
reference_url https://access.redhat.com/errata/RHSA-2024:7726
reference_id RHSA-2024:7726
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7726
11
reference_url https://access.redhat.com/errata/RHSA-2025:1671
reference_id RHSA-2025:1671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1671
12
reference_url https://access.redhat.com/errata/RHSA-2025:1673
reference_id RHSA-2025:1673
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1673
13
reference_url https://usn.ubuntu.com/6944-1/
reference_id USN-6944-1
reference_type
scores
url https://usn.ubuntu.com/6944-1/
14
reference_url https://usn.ubuntu.com/6944-2/
reference_id USN-6944-2
reference_type
scores
url https://usn.ubuntu.com/6944-2/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u7%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.9.1-1?distro=trixie
purl pkg:deb/debian/curl@8.9.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.9.1-1%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2024-7264
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-75nw-4e2d-zqgg
33
url VCID-79sv-kzb5-hbc4
vulnerability_id VCID-79sv-kzb5-hbc4
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3822.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3822.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3822
reference_id
reference_type
scores
0
value 0.16566
scoring_system epss
scoring_elements 0.94879
published_at 2026-04-01T12:55:00Z
1
value 0.16566
scoring_system epss
scoring_elements 0.94923
published_at 2026-04-16T12:55:00Z
2
value 0.16566
scoring_system epss
scoring_elements 0.94888
published_at 2026-04-02T12:55:00Z
3
value 0.16566
scoring_system epss
scoring_elements 0.94891
published_at 2026-04-04T12:55:00Z
4
value 0.16566
scoring_system epss
scoring_elements 0.94893
published_at 2026-04-07T12:55:00Z
5
value 0.16566
scoring_system epss
scoring_elements 0.94902
published_at 2026-04-08T12:55:00Z
6
value 0.16566
scoring_system epss
scoring_elements 0.94907
published_at 2026-04-09T12:55:00Z
7
value 0.16566
scoring_system epss
scoring_elements 0.94911
published_at 2026-04-11T12:55:00Z
8
value 0.16566
scoring_system epss
scoring_elements 0.94913
published_at 2026-04-12T12:55:00Z
9
value 0.16566
scoring_system epss
scoring_elements 0.94916
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3822
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3822
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3822
3
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf
reference_id
reference_type
scores
url https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf
4
reference_url https://curl.haxx.se/docs/CVE-2019-3822.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/CVE-2019-3822.html
5
reference_url https://curl.se/docs/CVE-2019-3822.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2019-3822.html
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E
11
reference_url https://security.netapp.com/advisory/ntap-20190315-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190315-0001/
12
reference_url https://security.netapp.com/advisory/ntap-20190719-0004/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190719-0004/
13
reference_url https://support.f5.com/csp/article/K84141449
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K84141449
14
reference_url https://support.f5.com/csp/article/K84141449?utm_source=f5support&amp%3Butm_medium=RSS
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K84141449?utm_source=f5support&amp%3Butm_medium=RSS
15
reference_url https://www.debian.org/security/2019/dsa-4386
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4386
16
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
17
reference_url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
18
reference_url http://www.securityfocus.com/bid/106950
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106950
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1670254
reference_id 1670254
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1670254
20
reference_url https://security.archlinux.org/ASA-201902-10
reference_id ASA-201902-10
reference_type
scores
url https://security.archlinux.org/ASA-201902-10
21
reference_url https://security.archlinux.org/ASA-201902-11
reference_id ASA-201902-11
reference_type
scores
url https://security.archlinux.org/ASA-201902-11
22
reference_url https://security.archlinux.org/ASA-201902-12
reference_id ASA-201902-12
reference_type
scores
url https://security.archlinux.org/ASA-201902-12
23
reference_url https://security.archlinux.org/ASA-201902-13
reference_id ASA-201902-13
reference_type
scores
url https://security.archlinux.org/ASA-201902-13
24
reference_url https://security.archlinux.org/ASA-201902-9
reference_id ASA-201902-9
reference_type
scores
url https://security.archlinux.org/ASA-201902-9
25
reference_url https://security.archlinux.org/AVG-873
reference_id AVG-873
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-873
26
reference_url https://security.archlinux.org/AVG-874
reference_id AVG-874
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-874
27
reference_url https://security.archlinux.org/AVG-875
reference_id AVG-875
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-875
28
reference_url https://security.archlinux.org/AVG-876
reference_id AVG-876
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-876
29
reference_url https://security.archlinux.org/AVG-877
reference_id AVG-877
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-877
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:services_tools_bundle:19.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:services_tools_bundle:19.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:services_tools_bundle:19.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3822
reference_id CVE-2019-3822
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
2
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-3822
53
reference_url https://security.gentoo.org/glsa/201903-03
reference_id GLSA-201903-03
reference_type
scores
url https://security.gentoo.org/glsa/201903-03
54
reference_url https://access.redhat.com/errata/RHSA-2019:3701
reference_id RHSA-2019:3701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3701
55
reference_url https://usn.ubuntu.com/3882-1/
reference_id USN-3882-1
reference_type
scores
url https://usn.ubuntu.com/3882-1/
fixed_packages
0
url pkg:deb/debian/curl@7.64.0-1?distro=trixie
purl pkg:deb/debian/curl@7.64.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.64.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2019-3822
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-79sv-kzb5-hbc4
34
url VCID-7c8e-eaqy-akeu
vulnerability_id VCID-7c8e-eaqy-akeu
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3153.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3153.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3153
reference_id
reference_type
scores
0
value 0.0976
scoring_system epss
scoring_elements 0.9296
published_at 2026-04-16T12:55:00Z
1
value 0.0976
scoring_system epss
scoring_elements 0.92922
published_at 2026-04-01T12:55:00Z
2
value 0.0976
scoring_system epss
scoring_elements 0.9293
published_at 2026-04-02T12:55:00Z
3
value 0.0976
scoring_system epss
scoring_elements 0.92934
published_at 2026-04-04T12:55:00Z
4
value 0.0976
scoring_system epss
scoring_elements 0.92933
published_at 2026-04-07T12:55:00Z
5
value 0.0976
scoring_system epss
scoring_elements 0.92941
published_at 2026-04-08T12:55:00Z
6
value 0.0976
scoring_system epss
scoring_elements 0.92945
published_at 2026-04-09T12:55:00Z
7
value 0.0976
scoring_system epss
scoring_elements 0.9295
published_at 2026-04-13T12:55:00Z
8
value 0.0976
scoring_system epss
scoring_elements 0.92949
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3153
2
reference_url https://curl.se/docs/CVE-2015-3153.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2015-3153.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1217341
reference_id 1217341
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1217341
5
reference_url https://usn.ubuntu.com/2591-1/
reference_id USN-2591-1
reference_type
scores
url https://usn.ubuntu.com/2591-1/
fixed_packages
0
url pkg:deb/debian/curl@7.42.1-1?distro=trixie
purl pkg:deb/debian/curl@7.42.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.42.1-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2015-3153
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7c8e-eaqy-akeu
35
url VCID-7srk-hshe-h3f4
vulnerability_id VCID-7srk-hshe-h3f4
summary
Improper Authentication
An authentication bypass vulnerability exists in libcurl v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27538.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27538.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27538
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03579
published_at 2026-04-11T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03588
published_at 2026-04-04T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03622
published_at 2026-04-09T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.036
published_at 2026-04-08T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03599
published_at 2026-04-07T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03574
published_at 2026-04-02T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05545
published_at 2026-04-16T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05601
published_at 2026-04-12T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05595
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27538
2
reference_url https://curl.se/docs/CVE-2023-27538.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-27538.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27538
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1898475
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:52:04Z/
url https://hackerone.com/reports/1898475
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2179103
reference_id 2179103
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2179103
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-27538
reference_id CVE-2023-27538
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-27538
9
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:52:04Z/
url https://security.gentoo.org/glsa/202310-12
10
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
reference_id msg00025.html
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:52:04Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
11
reference_url https://security.netapp.com/advisory/ntap-20230420-0010/
reference_id ntap-20230420-0010
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:52:04Z/
url https://security.netapp.com/advisory/ntap-20230420-0010/
12
reference_url https://access.redhat.com/errata/RHSA-2023:6679
reference_id RHSA-2023:6679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6679
13
reference_url https://usn.ubuntu.com/5964-1/
reference_id USN-5964-1
reference_type
scores
url https://usn.ubuntu.com/5964-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u8?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u8%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-7?distro=trixie
purl pkg:deb/debian/curl@7.88.1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-7%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2023-27538
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7srk-hshe-h3f4
36
url VCID-7vt9-pf5q-uqb6
vulnerability_id VCID-7vt9-pf5q-uqb6
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/errata/RHBA-2019:0327
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHBA-2019:0327
1
reference_url https://access.redhat.com/errata/RHSA-2018:3157
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3157
2
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3558
3
reference_url https://access.redhat.com/errata/RHSA-2020:0544
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0544
4
reference_url https://access.redhat.com/errata/RHSA-2020:0594
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0594
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000301.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000301.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000301
reference_id
reference_type
scores
0
value 0.02712
scoring_system epss
scoring_elements 0.85931
published_at 2026-04-16T12:55:00Z
1
value 0.02761
scoring_system epss
scoring_elements 0.85984
published_at 2026-04-07T12:55:00Z
2
value 0.02761
scoring_system epss
scoring_elements 0.85957
published_at 2026-04-01T12:55:00Z
3
value 0.02761
scoring_system epss
scoring_elements 0.85968
published_at 2026-04-02T12:55:00Z
4
value 0.02761
scoring_system epss
scoring_elements 0.8602
published_at 2026-04-13T12:55:00Z
5
value 0.02761
scoring_system epss
scoring_elements 0.86025
published_at 2026-04-12T12:55:00Z
6
value 0.02761
scoring_system epss
scoring_elements 0.86027
published_at 2026-04-11T12:55:00Z
7
value 0.02761
scoring_system epss
scoring_elements 0.86013
published_at 2026-04-09T12:55:00Z
8
value 0.02761
scoring_system epss
scoring_elements 0.86003
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000301
7
reference_url https://curl.haxx.se/docs/adv_2018-b138.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_2018-b138.html
8
reference_url https://curl.se/docs/CVE-2018-1000301.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-1000301.html
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000301
10
reference_url https://lists.debian.org/debian-lts-announce/2018/05/msg00010.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/05/msg00010.html
11
reference_url https://usn.ubuntu.com/3598-2/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3598-2/
12
reference_url https://www.debian.org/security/2018/dsa-4202
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4202
13
reference_url https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
14
reference_url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
15
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
16
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
17
reference_url http://www.securityfocus.com/bid/104225
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104225
18
reference_url http://www.securitytracker.com/id/1040931
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040931
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1575536
reference_id 1575536
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1575536
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898856
reference_id 898856
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898856
21
reference_url https://security.archlinux.org/ASA-201805-13
reference_id ASA-201805-13
reference_type
scores
url https://security.archlinux.org/ASA-201805-13
22
reference_url https://security.archlinux.org/ASA-201805-14
reference_id ASA-201805-14
reference_type
scores
url https://security.archlinux.org/ASA-201805-14
23
reference_url https://security.archlinux.org/ASA-201805-15
reference_id ASA-201805-15
reference_type
scores
url https://security.archlinux.org/ASA-201805-15
24
reference_url https://security.archlinux.org/ASA-201805-16
reference_id ASA-201805-16
reference_type
scores
url https://security.archlinux.org/ASA-201805-16
25
reference_url https://security.archlinux.org/ASA-201805-17
reference_id ASA-201805-17
reference_type
scores
url https://security.archlinux.org/ASA-201805-17
26
reference_url https://security.archlinux.org/ASA-201805-18
reference_id ASA-201805-18
reference_type
scores
url https://security.archlinux.org/ASA-201805-18
27
reference_url https://security.archlinux.org/AVG-694
reference_id AVG-694
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-694
28
reference_url https://security.archlinux.org/AVG-695
reference_id AVG-695
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-695
29
reference_url https://security.archlinux.org/AVG-696
reference_id AVG-696
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-696
30
reference_url https://security.archlinux.org/AVG-697
reference_id AVG-697
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-697
31
reference_url https://security.archlinux.org/AVG-698
reference_id AVG-698
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-698
32
reference_url https://security.archlinux.org/AVG-699
reference_id AVG-699
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-699
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1000301
reference_id CVE-2018-1000301
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-1000301
52
reference_url https://security.gentoo.org/glsa/201806-05
reference_id GLSA-201806-05
reference_type
scores
url https://security.gentoo.org/glsa/201806-05
53
reference_url https://usn.ubuntu.com/3648-1/
reference_id USN-3648-1
reference_type
scores
url https://usn.ubuntu.com/3648-1/
fixed_packages
0
url pkg:deb/debian/curl@7.60.0-1?distro=trixie
purl pkg:deb/debian/curl@7.60.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.60.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2018-1000301
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7vt9-pf5q-uqb6
37
url VCID-7xxh-66ys-4bhw
vulnerability_id VCID-7xxh-66ys-4bhw
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5419.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5419.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5419
reference_id
reference_type
scores
0
value 0.01968
scoring_system epss
scoring_elements 0.83461
published_at 2026-04-01T12:55:00Z
1
value 0.01968
scoring_system epss
scoring_elements 0.8356
published_at 2026-04-16T12:55:00Z
2
value 0.01968
scoring_system epss
scoring_elements 0.83529
published_at 2026-04-12T12:55:00Z
3
value 0.01968
scoring_system epss
scoring_elements 0.83526
published_at 2026-04-13T12:55:00Z
4
value 0.01968
scoring_system epss
scoring_elements 0.83474
published_at 2026-04-02T12:55:00Z
5
value 0.01968
scoring_system epss
scoring_elements 0.83488
published_at 2026-04-04T12:55:00Z
6
value 0.01968
scoring_system epss
scoring_elements 0.83487
published_at 2026-04-07T12:55:00Z
7
value 0.01968
scoring_system epss
scoring_elements 0.83511
published_at 2026-04-08T12:55:00Z
8
value 0.01968
scoring_system epss
scoring_elements 0.83521
published_at 2026-04-09T12:55:00Z
9
value 0.01968
scoring_system epss
scoring_elements 0.83535
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5419
2
reference_url https://curl.se/docs/CVE-2016-5419.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-5419.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1362183
reference_id 1362183
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1362183
8
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
9
reference_url https://access.redhat.com/errata/RHSA-2016:2575
reference_id RHSA-2016:2575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2575
10
reference_url https://access.redhat.com/errata/RHSA-2016:2957
reference_id RHSA-2016:2957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2957
11
reference_url https://usn.ubuntu.com/3048-1/
reference_id USN-3048-1
reference_type
scores
url https://usn.ubuntu.com/3048-1/
fixed_packages
0
url pkg:deb/debian/curl@7.50.1-1?distro=trixie
purl pkg:deb/debian/curl@7.50.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.50.1-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-5419
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7xxh-66ys-4bhw
38
url VCID-87qu-j64w-p7fj
vulnerability_id VCID-87qu-j64w-p7fj
summary unchecked ssl certificate host name
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4545.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4545.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4545
reference_id
reference_type
scores
0
value 0.00353
scoring_system epss
scoring_elements 0.57761
published_at 2026-04-16T12:55:00Z
1
value 0.00353
scoring_system epss
scoring_elements 0.57618
published_at 2026-04-01T12:55:00Z
2
value 0.00353
scoring_system epss
scoring_elements 0.57702
published_at 2026-04-02T12:55:00Z
3
value 0.00353
scoring_system epss
scoring_elements 0.57724
published_at 2026-04-04T12:55:00Z
4
value 0.00353
scoring_system epss
scoring_elements 0.57699
published_at 2026-04-07T12:55:00Z
5
value 0.00353
scoring_system epss
scoring_elements 0.57754
published_at 2026-04-08T12:55:00Z
6
value 0.00353
scoring_system epss
scoring_elements 0.57756
published_at 2026-04-09T12:55:00Z
7
value 0.00353
scoring_system epss
scoring_elements 0.57772
published_at 2026-04-11T12:55:00Z
8
value 0.00353
scoring_system epss
scoring_elements 0.57751
published_at 2026-04-12T12:55:00Z
9
value 0.00353
scoring_system epss
scoring_elements 0.57731
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4545
2
reference_url https://curl.se/docs/CVE-2013-4545.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2013-4545.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4545
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1029159
reference_id 1029159
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1029159
5
reference_url https://usn.ubuntu.com/2048-1/
reference_id USN-2048-1
reference_type
scores
url https://usn.ubuntu.com/2048-1/
fixed_packages
0
url pkg:deb/debian/curl@7.33.0-1?distro=trixie
purl pkg:deb/debian/curl@7.33.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.33.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2013-4545
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-87qu-j64w-p7fj
39
url VCID-8m6a-ej6a-g3df
vulnerability_id VCID-8m6a-ej6a-g3df
summary curl: freeing stack buffer in utf8asn1str
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6197.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6197.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6197
reference_id
reference_type
scores
0
value 0.01302
scoring_system epss
scoring_elements 0.79765
published_at 2026-04-16T12:55:00Z
1
value 0.01302
scoring_system epss
scoring_elements 0.79695
published_at 2026-04-02T12:55:00Z
2
value 0.01302
scoring_system epss
scoring_elements 0.79716
published_at 2026-04-04T12:55:00Z
3
value 0.01302
scoring_system epss
scoring_elements 0.79701
published_at 2026-04-07T12:55:00Z
4
value 0.01302
scoring_system epss
scoring_elements 0.7973
published_at 2026-04-08T12:55:00Z
5
value 0.01302
scoring_system epss
scoring_elements 0.79737
published_at 2026-04-13T12:55:00Z
6
value 0.01302
scoring_system epss
scoring_elements 0.79759
published_at 2026-04-11T12:55:00Z
7
value 0.01302
scoring_system epss
scoring_elements 0.79743
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6197
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.openwall.com/lists/oss-security/2024/07/24/1
reference_id 1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-24T18:42:30Z/
url http://www.openwall.com/lists/oss-security/2024/07/24/1
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076996
reference_id 1076996
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076996
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2299653
reference_id 2299653
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2299653
6
reference_url https://hackerone.com/reports/2559516
reference_id 2559516
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-24T18:42:30Z/
url https://hackerone.com/reports/2559516
7
reference_url http://www.openwall.com/lists/oss-security/2024/07/24/5
reference_id 5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-24T18:42:30Z/
url http://www.openwall.com/lists/oss-security/2024/07/24/5
8
reference_url https://curl.se/docs/CVE-2024-6197.html
reference_id CVE-2024-6197.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Medium
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-24T18:42:30Z/
url https://curl.se/docs/CVE-2024-6197.html
9
reference_url https://curl.se/docs/CVE-2024-6197.json
reference_id CVE-2024-6197.json
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-24T18:42:30Z/
url https://curl.se/docs/CVE-2024-6197.json
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.9.0-1?distro=trixie
purl pkg:deb/debian/curl@8.9.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.9.0-1%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2024-6197
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8m6a-ej6a-g3df
40
url VCID-8zks-th64-33b8
vulnerability_id VCID-8zks-th64-33b8
summary curl: curl: Unauthorized access due to improper HTTP proxy connection reuse
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3784.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3784.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-3784
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.03044
published_at 2026-04-11T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03051
published_at 2026-04-04T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.03081
published_at 2026-04-09T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.03056
published_at 2026-04-08T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.03053
published_at 2026-04-07T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.03037
published_at 2026-04-02T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03659
published_at 2026-04-16T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03709
published_at 2026-04-12T12:55:00Z
8
value 0.00016
scoring_system epss
scoring_elements 0.03683
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-3784
2
reference_url https://curl.se/docs/CVE-2026-3784.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:48:38Z/
url https://curl.se/docs/CVE-2026-3784.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3784
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3784
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/3584903
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:48:38Z/
url https://hackerone.com/reports/3584903
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2446449
reference_id 2446449
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2446449
7
reference_url https://curl.se/docs/CVE-2026-3784.json
reference_id CVE-2026-3784.json
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:48:38Z/
url https://curl.se/docs/CVE-2026-3784.json
8
reference_url https://usn.ubuntu.com/8084-1/
reference_id USN-8084-1
reference_type
scores
url https://usn.ubuntu.com/8084-1/
9
reference_url https://usn.ubuntu.com/8099-1/
reference_id USN-8099-1
reference_type
scores
url https://usn.ubuntu.com/8099-1/
fixed_packages
0
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2026-3784
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8zks-th64-33b8
41
url VCID-9cbd-x468-rkaw
vulnerability_id VCID-9cbd-x468-rkaw
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16840.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16840.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16840
reference_id
reference_type
scores
0
value 0.00225
scoring_system epss
scoring_elements 0.451
published_at 2026-04-01T12:55:00Z
1
value 0.00305
scoring_system epss
scoring_elements 0.5382
published_at 2026-04-16T12:55:00Z
2
value 0.00305
scoring_system epss
scoring_elements 0.53718
published_at 2026-04-02T12:55:00Z
3
value 0.00305
scoring_system epss
scoring_elements 0.53745
published_at 2026-04-04T12:55:00Z
4
value 0.00305
scoring_system epss
scoring_elements 0.53717
published_at 2026-04-07T12:55:00Z
5
value 0.00305
scoring_system epss
scoring_elements 0.5377
published_at 2026-04-08T12:55:00Z
6
value 0.00305
scoring_system epss
scoring_elements 0.53767
published_at 2026-04-09T12:55:00Z
7
value 0.00305
scoring_system epss
scoring_elements 0.53815
published_at 2026-04-11T12:55:00Z
8
value 0.00305
scoring_system epss
scoring_elements 0.53798
published_at 2026-04-12T12:55:00Z
9
value 0.00305
scoring_system epss
scoring_elements 0.53783
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16840
2
reference_url https://curl.se/docs/CVE-2018-16840.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-16840.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16840
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1642203
reference_id 1642203
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1642203
6
reference_url https://security.archlinux.org/ASA-201811-4
reference_id ASA-201811-4
reference_type
scores
url https://security.archlinux.org/ASA-201811-4
7
reference_url https://security.archlinux.org/ASA-201811-5
reference_id ASA-201811-5
reference_type
scores
url https://security.archlinux.org/ASA-201811-5
8
reference_url https://security.archlinux.org/ASA-201811-6
reference_id ASA-201811-6
reference_type
scores
url https://security.archlinux.org/ASA-201811-6
9
reference_url https://security.archlinux.org/ASA-201811-7
reference_id ASA-201811-7
reference_type
scores
url https://security.archlinux.org/ASA-201811-7
10
reference_url https://security.archlinux.org/ASA-201811-8
reference_id ASA-201811-8
reference_type
scores
url https://security.archlinux.org/ASA-201811-8
11
reference_url https://security.archlinux.org/ASA-201811-9
reference_id ASA-201811-9
reference_type
scores
url https://security.archlinux.org/ASA-201811-9
12
reference_url https://security.archlinux.org/AVG-795
reference_id AVG-795
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-795
13
reference_url https://security.archlinux.org/AVG-796
reference_id AVG-796
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-796
14
reference_url https://security.archlinux.org/AVG-797
reference_id AVG-797
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-797
15
reference_url https://security.archlinux.org/AVG-798
reference_id AVG-798
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-798
16
reference_url https://security.archlinux.org/AVG-799
reference_id AVG-799
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-799
17
reference_url https://security.archlinux.org/AVG-800
reference_id AVG-800
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-800
18
reference_url https://security.gentoo.org/glsa/201903-03
reference_id GLSA-201903-03
reference_type
scores
url https://security.gentoo.org/glsa/201903-03
19
reference_url https://usn.ubuntu.com/3805-1/
reference_id USN-3805-1
reference_type
scores
url https://usn.ubuntu.com/3805-1/
fixed_packages
0
url pkg:deb/debian/curl@7.62.0-1?distro=trixie
purl pkg:deb/debian/curl@7.62.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.62.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2018-16840
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9cbd-x468-rkaw
42
url VCID-9ggp-5wfj-ufcq
vulnerability_id VCID-9ggp-5wfj-ufcq
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43552.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43552.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43552
reference_id
reference_type
scores
0
value 0.00203
scoring_system epss
scoring_elements 0.42409
published_at 2026-04-13T12:55:00Z
1
value 0.00203
scoring_system epss
scoring_elements 0.42428
published_at 2026-04-02T12:55:00Z
2
value 0.00203
scoring_system epss
scoring_elements 0.42458
published_at 2026-04-16T12:55:00Z
3
value 0.00203
scoring_system epss
scoring_elements 0.42397
published_at 2026-04-07T12:55:00Z
4
value 0.00203
scoring_system epss
scoring_elements 0.42447
published_at 2026-04-08T12:55:00Z
5
value 0.00203
scoring_system epss
scoring_elements 0.42455
published_at 2026-04-09T12:55:00Z
6
value 0.00203
scoring_system epss
scoring_elements 0.42477
published_at 2026-04-11T12:55:00Z
7
value 0.00203
scoring_system epss
scoring_elements 0.4244
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43552
2
reference_url https://curl.se/docs/CVE-2022-43552.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-43552.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://hackerone.com/reports/1764858
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/
url https://hackerone.com/reports/1764858
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026830
reference_id 1026830
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026830
8
reference_url http://seclists.org/fulldisclosure/2023/Mar/17
reference_id 17
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/
url http://seclists.org/fulldisclosure/2023/Mar/17
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2152652
reference_id 2152652
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2152652
10
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/
url https://security.gentoo.org/glsa/202310-12
11
reference_url https://support.apple.com/kb/HT213670
reference_id HT213670
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/
url https://support.apple.com/kb/HT213670
12
reference_url https://security.netapp.com/advisory/ntap-20230214-0002/
reference_id ntap-20230214-0002
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/
url https://security.netapp.com/advisory/ntap-20230214-0002/
13
reference_url https://access.redhat.com/errata/RHSA-2023:2478
reference_id RHSA-2023:2478
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2478
14
reference_url https://access.redhat.com/errata/RHSA-2023:2963
reference_id RHSA-2023:2963
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2963
15
reference_url https://access.redhat.com/errata/RHSA-2023:3354
reference_id RHSA-2023:3354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3354
16
reference_url https://access.redhat.com/errata/RHSA-2023:3355
reference_id RHSA-2023:3355
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3355
17
reference_url https://access.redhat.com/errata/RHSA-2023:7743
reference_id RHSA-2023:7743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7743
18
reference_url https://access.redhat.com/errata/RHSA-2024:0428
reference_id RHSA-2024:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0428
19
reference_url https://usn.ubuntu.com/5788-1/
reference_id USN-5788-1
reference_type
scores
url https://usn.ubuntu.com/5788-1/
20
reference_url https://usn.ubuntu.com/5894-1/
reference_id USN-5894-1
reference_type
scores
url https://usn.ubuntu.com/5894-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u5%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.86.0-3?distro=trixie
purl pkg:deb/debian/curl@7.86.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.86.0-3%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2022-43552
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ggp-5wfj-ufcq
43
url VCID-9mjz-apkm-g7h1
vulnerability_id VCID-9mjz-apkm-g7h1
summary libcurl: curl: QUIC certificate check skip with wolfSSL
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4947.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4947.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4947
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22628
published_at 2026-04-16T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22731
published_at 2026-04-02T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22775
published_at 2026-04-04T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22565
published_at 2026-04-07T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22641
published_at 2026-04-08T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.22692
published_at 2026-04-09T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.2271
published_at 2026-04-11T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22671
published_at 2026-04-12T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.22613
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4947
2
reference_url https://curl.se/docs/CVE-2025-4947.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Medium
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T13:57:59Z/
url https://curl.se/docs/CVE-2025-4947.html
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://hackerone.com/reports/3150884
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T13:57:59Z/
url https://hackerone.com/reports/3150884
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2368887
reference_id 2368887
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2368887
6
reference_url https://security.archlinux.org/AVG-2887
reference_id AVG-2887
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2887
7
reference_url https://curl.se/docs/CVE-2025-4947.json
reference_id CVE-2025-4947.json
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T13:57:59Z/
url https://curl.se/docs/CVE-2025-4947.json
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.0-1?distro=trixie
purl pkg:deb/debian/curl@8.14.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.0-1%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2025-4947
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9mjz-apkm-g7h1
44
url VCID-9nak-pscy-e7gs
vulnerability_id VCID-9nak-pscy-e7gs
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32221.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32221.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32221
reference_id
reference_type
scores
0
value 0.01681
scoring_system epss
scoring_elements 0.82218
published_at 2026-04-16T12:55:00Z
1
value 0.01681
scoring_system epss
scoring_elements 0.82185
published_at 2026-04-12T12:55:00Z
2
value 0.01681
scoring_system epss
scoring_elements 0.82179
published_at 2026-04-13T12:55:00Z
3
value 0.02591
scoring_system epss
scoring_elements 0.8553
published_at 2026-04-02T12:55:00Z
4
value 0.02591
scoring_system epss
scoring_elements 0.85547
published_at 2026-04-04T12:55:00Z
5
value 0.02753
scoring_system epss
scoring_elements 0.85998
published_at 2026-04-09T12:55:00Z
6
value 0.02753
scoring_system epss
scoring_elements 0.86012
published_at 2026-04-11T12:55:00Z
7
value 0.02753
scoring_system epss
scoring_elements 0.85988
published_at 2026-04-08T12:55:00Z
8
value 0.02753
scoring_system epss
scoring_elements 0.85969
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32221
2
reference_url https://curl.se/docs/CVE-2022-32221.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-32221.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://hackerone.com/reports/1704017
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://hackerone.com/reports/1704017
7
reference_url http://seclists.org/fulldisclosure/2023/Jan/19
reference_id 19
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url http://seclists.org/fulldisclosure/2023/Jan/19
8
reference_url http://seclists.org/fulldisclosure/2023/Jan/20
reference_id 20
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url http://seclists.org/fulldisclosure/2023/Jan/20
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2135411
reference_id 2135411
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2135411
10
reference_url http://www.openwall.com/lists/oss-security/2023/05/17/4
reference_id 4
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url http://www.openwall.com/lists/oss-security/2023/05/17/4
11
reference_url https://www.debian.org/security/2023/dsa-5330
reference_id dsa-5330
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://www.debian.org/security/2023/dsa-5330
12
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://security.gentoo.org/glsa/202212-01
13
reference_url https://support.apple.com/kb/HT213604
reference_id HT213604
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://support.apple.com/kb/HT213604
14
reference_url https://support.apple.com/kb/HT213605
reference_id HT213605
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://support.apple.com/kb/HT213605
15
reference_url https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html
16
reference_url https://security.netapp.com/advisory/ntap-20230110-0006/
reference_id ntap-20230110-0006
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://security.netapp.com/advisory/ntap-20230110-0006/
17
reference_url https://security.netapp.com/advisory/ntap-20230208-0002/
reference_id ntap-20230208-0002
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://security.netapp.com/advisory/ntap-20230208-0002/
18
reference_url https://access.redhat.com/errata/RHSA-2022:8840
reference_id RHSA-2022:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8840
19
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
20
reference_url https://access.redhat.com/errata/RHSA-2023:0333
reference_id RHSA-2023:0333
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0333
21
reference_url https://access.redhat.com/errata/RHSA-2023:4139
reference_id RHSA-2023:4139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4139
22
reference_url https://usn.ubuntu.com/5702-1/
reference_id USN-5702-1
reference_type
scores
url https://usn.ubuntu.com/5702-1/
23
reference_url https://usn.ubuntu.com/5702-2/
reference_id USN-5702-2
reference_type
scores
url https://usn.ubuntu.com/5702-2/
24
reference_url https://usn.ubuntu.com/5823-1/
reference_id USN-5823-1
reference_type
scores
url https://usn.ubuntu.com/5823-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u5%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.86.0-1?distro=trixie
purl pkg:deb/debian/curl@7.86.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.86.0-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2022-32221
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9nak-pscy-e7gs
45
url VCID-9q2w-yxvk-pbhd
vulnerability_id VCID-9q2w-yxvk-pbhd
summary
cURL is vulnerable to local arbitrary code execution via buffer overflow
    due to the insecure parsing of URLs.
references
0
reference_url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.16/SCOSA-2006.16.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.16/SCOSA-2006.16.txt
1
reference_url http://curl.haxx.se/docs/adv_20051207.html
reference_id
reference_type
scores
url http://curl.haxx.se/docs/adv_20051207.html
2
reference_url http://docs.info.apple.com/article.html?artnum=307562
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=307562
3
reference_url http://lists.apple.com/archives/security-announce/2006/May/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2006/May/msg00003.html
4
reference_url http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
5
reference_url http://qa.openoffice.org/issues/show_bug.cgi?id=59032
reference_id
reference_type
scores
url http://qa.openoffice.org/issues/show_bug.cgi?id=59032
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4077.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4077.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-4077
reference_id
reference_type
scores
0
value 0.00266
scoring_system epss
scoring_elements 0.50143
published_at 2026-04-16T12:55:00Z
1
value 0.00266
scoring_system epss
scoring_elements 0.50051
published_at 2026-04-01T12:55:00Z
2
value 0.00266
scoring_system epss
scoring_elements 0.50101
published_at 2026-04-12T12:55:00Z
3
value 0.00266
scoring_system epss
scoring_elements 0.50098
published_at 2026-04-13T12:55:00Z
4
value 0.00266
scoring_system epss
scoring_elements 0.50085
published_at 2026-04-02T12:55:00Z
5
value 0.00266
scoring_system epss
scoring_elements 0.50113
published_at 2026-04-04T12:55:00Z
6
value 0.00266
scoring_system epss
scoring_elements 0.50063
published_at 2026-04-07T12:55:00Z
7
value 0.00266
scoring_system epss
scoring_elements 0.50117
published_at 2026-04-08T12:55:00Z
8
value 0.00266
scoring_system epss
scoring_elements 0.5011
published_at 2026-04-09T12:55:00Z
9
value 0.00266
scoring_system epss
scoring_elements 0.50128
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-4077
8
reference_url https://curl.se/docs/CVE-2005-4077.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2005-4077.html
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4077
10
reference_url http://secunia.com/advisories/17907
reference_id
reference_type
scores
url http://secunia.com/advisories/17907
11
reference_url http://secunia.com/advisories/17960
reference_id
reference_type
scores
url http://secunia.com/advisories/17960
12
reference_url http://secunia.com/advisories/17961
reference_id
reference_type
scores
url http://secunia.com/advisories/17961
13
reference_url http://secunia.com/advisories/17965
reference_id
reference_type
scores
url http://secunia.com/advisories/17965
14
reference_url http://secunia.com/advisories/17977
reference_id
reference_type
scores
url http://secunia.com/advisories/17977
15
reference_url http://secunia.com/advisories/18105
reference_id
reference_type
scores
url http://secunia.com/advisories/18105
16
reference_url http://secunia.com/advisories/18188
reference_id
reference_type
scores
url http://secunia.com/advisories/18188
17
reference_url http://secunia.com/advisories/18336
reference_id
reference_type
scores
url http://secunia.com/advisories/18336
18
reference_url http://secunia.com/advisories/19261
reference_id
reference_type
scores
url http://secunia.com/advisories/19261
19
reference_url http://secunia.com/advisories/19433
reference_id
reference_type
scores
url http://secunia.com/advisories/19433
20
reference_url http://secunia.com/advisories/19457
reference_id
reference_type
scores
url http://secunia.com/advisories/19457
21
reference_url http://secunia.com/advisories/20077
reference_id
reference_type
scores
url http://secunia.com/advisories/20077
22
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10855
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10855
23
reference_url http://www.debian.org/security/2005/dsa-919
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-919
24
reference_url http://www.gentoo.org/security/en/glsa/glsa-200512-09.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200512-09.xml
25
reference_url http://www.gentoo.org/security/en/glsa/glsa-200603-25.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200603-25.xml
26
reference_url http://www.hardened-php.net/advisory_242005.109.html
reference_id
reference_type
scores
url http://www.hardened-php.net/advisory_242005.109.html
27
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:224
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:224
28
reference_url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html
29
reference_url http://www.redhat.com/support/errata/RHSA-2005-875.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-875.html
30
reference_url http://www.securityfocus.com/archive/1/418849/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/418849/100/0/threaded
31
reference_url http://www.securityfocus.com/bid/15756
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15756
32
reference_url http://www.securityfocus.com/bid/17951
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/17951
33
reference_url http://www.trustix.org/errata/2005/0072/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2005/0072/
34
reference_url http://www.us-cert.gov/cas/techalerts/TA06-132A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA06-132A.html
35
reference_url http://www.vupen.com/english/advisories/2005/2791
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2791
36
reference_url http://www.vupen.com/english/advisories/2006/0960
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/0960
37
reference_url http://www.vupen.com/english/advisories/2006/1779
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/1779
38
reference_url http://www.vupen.com/english/advisories/2008/0924/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/0924/references
39
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617850
reference_id 1617850
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617850
40
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342339
reference_id 342339
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342339
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:daniel_stenberg:curl:7.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.11.2:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:daniel_stenberg:curl:7.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:daniel_stenberg:curl:7.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:daniel_stenberg:curl:7.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12.2:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:daniel_stenberg:curl:7.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12.3:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:daniel_stenberg:curl:7.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.13:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:daniel_stenberg:curl:7.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.13.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:daniel_stenberg:curl:7.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.13.2:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:daniel_stenberg:curl:7.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.14:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:daniel_stenberg:curl:7.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.14.1:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:daniel_stenberg:curl:7.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.15:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-4077
reference_id CVE-2005-4077
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-4077
53
reference_url https://security.gentoo.org/glsa/200512-09
reference_id GLSA-200512-09
reference_type
scores
url https://security.gentoo.org/glsa/200512-09
54
reference_url https://security.gentoo.org/glsa/200603-25
reference_id GLSA-200603-25
reference_type
scores
url https://security.gentoo.org/glsa/200603-25
55
reference_url https://access.redhat.com/errata/RHSA-2005:875
reference_id RHSA-2005:875
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:875
56
reference_url https://usn.ubuntu.com/228-1/
reference_id USN-228-1
reference_type
scores
url https://usn.ubuntu.com/228-1/
fixed_packages
0
url pkg:deb/debian/curl@7.15.1-1?distro=trixie
purl pkg:deb/debian/curl@7.15.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.15.1-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2005-4077
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9q2w-yxvk-pbhd
46
url VCID-a3v7-ptf1-6qgd
vulnerability_id VCID-a3v7-ptf1-6qgd
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7141.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7141.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7141
reference_id
reference_type
scores
0
value 0.00524
scoring_system epss
scoring_elements 0.66857
published_at 2026-04-01T12:55:00Z
1
value 0.00524
scoring_system epss
scoring_elements 0.66895
published_at 2026-04-07T12:55:00Z
2
value 0.00524
scoring_system epss
scoring_elements 0.66921
published_at 2026-04-04T12:55:00Z
3
value 0.00524
scoring_system epss
scoring_elements 0.66943
published_at 2026-04-08T12:55:00Z
4
value 0.00524
scoring_system epss
scoring_elements 0.66957
published_at 2026-04-09T12:55:00Z
5
value 0.00524
scoring_system epss
scoring_elements 0.66977
published_at 2026-04-11T12:55:00Z
6
value 0.00524
scoring_system epss
scoring_elements 0.66963
published_at 2026-04-12T12:55:00Z
7
value 0.00524
scoring_system epss
scoring_elements 0.66932
published_at 2026-04-13T12:55:00Z
8
value 0.00524
scoring_system epss
scoring_elements 0.66964
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7141
2
reference_url https://curl.se/docs/CVE-2016-7141.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-7141.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7141
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7141
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1373229
reference_id 1373229
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1373229
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836918
reference_id 836918
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836918
6
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
7
reference_url https://access.redhat.com/errata/RHSA-2016:2575
reference_id RHSA-2016:2575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2575
8
reference_url https://access.redhat.com/errata/RHSA-2016:2957
reference_id RHSA-2016:2957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2957
9
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:deb/debian/curl@7.51.0-1?distro=trixie
purl pkg:deb/debian/curl@7.51.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-7141
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a3v7-ptf1-6qgd
47
url VCID-a9b6-m25r-kygw
vulnerability_id VCID-a9b6-m25r-kygw
summary The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, makes it easier for remote attackers to conduct man-in-the-middle attacks via a crafted wildcard SAN in a server certificate, as demonstrated by "*.com."
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9952
reference_id
reference_type
scores
0
value 0.01005
scoring_system epss
scoring_elements 0.77078
published_at 2026-04-16T12:55:00Z
1
value 0.01005
scoring_system epss
scoring_elements 0.77035
published_at 2026-04-09T12:55:00Z
2
value 0.01005
scoring_system epss
scoring_elements 0.77063
published_at 2026-04-11T12:55:00Z
3
value 0.01005
scoring_system epss
scoring_elements 0.77042
published_at 2026-04-12T12:55:00Z
4
value 0.01005
scoring_system epss
scoring_elements 0.77037
published_at 2026-04-13T12:55:00Z
5
value 0.01005
scoring_system epss
scoring_elements 0.76977
published_at 2026-04-01T12:55:00Z
6
value 0.01005
scoring_system epss
scoring_elements 0.76983
published_at 2026-04-02T12:55:00Z
7
value 0.01005
scoring_system epss
scoring_elements 0.77012
published_at 2026-04-04T12:55:00Z
8
value 0.01005
scoring_system epss
scoring_elements 0.76993
published_at 2026-04-07T12:55:00Z
9
value 0.01005
scoring_system epss
scoring_elements 0.77025
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9952
1
reference_url https://curl.se/docs/CVE-2016-9952.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-9952.html
2
reference_url https://curl.haxx.se/docs/adv_20161221B.html
reference_id adv_20161221B.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-23T19:19:07Z/
url https://curl.haxx.se/docs/adv_20161221B.html
3
reference_url https://curl.haxx.se/CVE-2016-9952.patch
reference_id CVE-2016-9952.patch
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-23T19:19:07Z/
url https://curl.haxx.se/CVE-2016-9952.patch
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-9952
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a9b6-m25r-kygw
48
url VCID-ac6r-spds-qbf5
vulnerability_id VCID-ac6r-spds-qbf5
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5435.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5435.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-5435
reference_id
reference_type
scores
0
value 0.00172
scoring_system epss
scoring_elements 0.38366
published_at 2026-04-01T12:55:00Z
1
value 0.00172
scoring_system epss
scoring_elements 0.38402
published_at 2026-04-13T12:55:00Z
2
value 0.00172
scoring_system epss
scoring_elements 0.38441
published_at 2026-04-08T12:55:00Z
3
value 0.00172
scoring_system epss
scoring_elements 0.38449
published_at 2026-04-16T12:55:00Z
4
value 0.00172
scoring_system epss
scoring_elements 0.38464
published_at 2026-04-11T12:55:00Z
5
value 0.00172
scoring_system epss
scoring_elements 0.38427
published_at 2026-04-12T12:55:00Z
6
value 0.00172
scoring_system epss
scoring_elements 0.38503
published_at 2026-04-02T12:55:00Z
7
value 0.00172
scoring_system epss
scoring_elements 0.38528
published_at 2026-04-04T12:55:00Z
8
value 0.00172
scoring_system epss
scoring_elements 0.3839
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-5435
2
reference_url https://curl.se/docs/CVE-2019-5435.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2019-5435.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5435
4
reference_url https://hackerone.com/reports/547630
reference_id
reference_type
scores
url https://hackerone.com/reports/547630
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1710609
reference_id 1710609
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1710609
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929352
reference_id 929352
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929352
7
reference_url https://security.archlinux.org/ASA-201905-13
reference_id ASA-201905-13
reference_type
scores
url https://security.archlinux.org/ASA-201905-13
8
reference_url https://security.archlinux.org/ASA-201905-14
reference_id ASA-201905-14
reference_type
scores
url https://security.archlinux.org/ASA-201905-14
9
reference_url https://security.archlinux.org/ASA-201905-15
reference_id ASA-201905-15
reference_type
scores
url https://security.archlinux.org/ASA-201905-15
10
reference_url https://security.archlinux.org/AVG-961
reference_id AVG-961
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-961
11
reference_url https://security.archlinux.org/AVG-962
reference_id AVG-962
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-962
12
reference_url https://security.archlinux.org/AVG-963
reference_id AVG-963
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-963
13
reference_url https://security.gentoo.org/glsa/202003-29
reference_id GLSA-202003-29
reference_type
scores
url https://security.gentoo.org/glsa/202003-29
14
reference_url https://access.redhat.com/errata/RHSA-2020:4383
reference_id RHSA-2020:4383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4383
15
reference_url https://access.redhat.com/errata/RHSA-2020:4384
reference_id RHSA-2020:4384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4384
16
reference_url https://usn.ubuntu.com/3993-1/
reference_id USN-3993-1
reference_type
scores
url https://usn.ubuntu.com/3993-1/
fixed_packages
0
url pkg:deb/debian/curl@7.64.0-4?distro=trixie
purl pkg:deb/debian/curl@7.64.0-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.64.0-4%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2019-5435
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ac6r-spds-qbf5
49
url VCID-ae59-w7a1-7keg
vulnerability_id VCID-ae59-w7a1-7keg
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:2486
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2486
1
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3558
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000254.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000254.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000254
reference_id
reference_type
scores
0
value 0.01178
scoring_system epss
scoring_elements 0.78736
published_at 2026-04-12T12:55:00Z
1
value 0.01178
scoring_system epss
scoring_elements 0.78727
published_at 2026-04-13T12:55:00Z
2
value 0.01318
scoring_system epss
scoring_elements 0.79891
published_at 2026-04-16T12:55:00Z
3
value 0.01348
scoring_system epss
scoring_elements 0.80036
published_at 2026-04-01T12:55:00Z
4
value 0.01348
scoring_system epss
scoring_elements 0.80043
published_at 2026-04-02T12:55:00Z
5
value 0.01348
scoring_system epss
scoring_elements 0.80064
published_at 2026-04-04T12:55:00Z
6
value 0.01348
scoring_system epss
scoring_elements 0.80053
published_at 2026-04-07T12:55:00Z
7
value 0.01348
scoring_system epss
scoring_elements 0.80081
published_at 2026-04-08T12:55:00Z
8
value 0.01348
scoring_system epss
scoring_elements 0.80089
published_at 2026-04-09T12:55:00Z
9
value 0.01348
scoring_system epss
scoring_elements 0.80109
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000254
4
reference_url https://curl.haxx.se/673d0cd8.patch
reference_id
reference_type
scores
url https://curl.haxx.se/673d0cd8.patch
5
reference_url https://curl.haxx.se/docs/adv_20171004.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_20171004.html
6
reference_url https://curl.se/docs/CVE-2017-1000254.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2017-1000254.html
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
13
reference_url https://support.apple.com/HT208331
reference_id
reference_type
scores
url https://support.apple.com/HT208331
14
reference_url http://www.debian.org/security/2017/dsa-3992
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3992
15
reference_url http://www.securityfocus.com/bid/101115
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101115
16
reference_url http://www.securitytracker.com/id/1039509
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039509
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1495541
reference_id 1495541
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1495541
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877671
reference_id 877671
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877671
19
reference_url https://security.archlinux.org/ASA-201710-2
reference_id ASA-201710-2
reference_type
scores
url https://security.archlinux.org/ASA-201710-2
20
reference_url https://security.archlinux.org/ASA-201710-3
reference_id ASA-201710-3
reference_type
scores
url https://security.archlinux.org/ASA-201710-3
21
reference_url https://security.archlinux.org/ASA-201710-4
reference_id ASA-201710-4
reference_type
scores
url https://security.archlinux.org/ASA-201710-4
22
reference_url https://security.archlinux.org/ASA-201710-5
reference_id ASA-201710-5
reference_type
scores
url https://security.archlinux.org/ASA-201710-5
23
reference_url https://security.archlinux.org/ASA-201710-6
reference_id ASA-201710-6
reference_type
scores
url https://security.archlinux.org/ASA-201710-6
24
reference_url https://security.archlinux.org/ASA-201710-7
reference_id ASA-201710-7
reference_type
scores
url https://security.archlinux.org/ASA-201710-7
25
reference_url https://security.archlinux.org/AVG-371
reference_id AVG-371
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-371
26
reference_url https://security.archlinux.org/AVG-386
reference_id AVG-386
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-386
27
reference_url https://security.archlinux.org/AVG-387
reference_id AVG-387
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-387
28
reference_url https://security.archlinux.org/AVG-388
reference_id AVG-388
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-388
29
reference_url https://security.archlinux.org/AVG-389
reference_id AVG-389
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-389
30
reference_url https://security.archlinux.org/AVG-422
reference_id AVG-422
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-422
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.55.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.0:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.55.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.1:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000254
reference_id CVE-2017-1000254
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000254
149
reference_url https://security.gentoo.org/glsa/201712-04
reference_id GLSA-201712-04
reference_type
scores
url https://security.gentoo.org/glsa/201712-04
150
reference_url https://usn.ubuntu.com/3441-1/
reference_id USN-3441-1
reference_type
scores
url https://usn.ubuntu.com/3441-1/
151
reference_url https://usn.ubuntu.com/3441-2/
reference_id USN-3441-2
reference_type
scores
url https://usn.ubuntu.com/3441-2/
fixed_packages
0
url pkg:deb/debian/curl@7.56.1-1?distro=trixie
purl pkg:deb/debian/curl@7.56.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.56.1-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2017-1000254
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ae59-w7a1-7keg
50
url VCID-amgy-dw6h-6ydf
vulnerability_id VCID-amgy-dw6h-6ydf
summary curl: curl: Arbitrary code execution or Denial of Service via use-after-free in SMB request handling
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3805.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3805.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-3805
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.11817
published_at 2026-04-11T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.1188
published_at 2026-04-04T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11805
published_at 2026-04-09T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.11752
published_at 2026-04-08T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11667
published_at 2026-04-07T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11837
published_at 2026-04-02T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12821
published_at 2026-04-16T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12966
published_at 2026-04-12T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12921
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-3805
2
reference_url https://curl.se/docs/CVE-2026-3805.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Medium
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:45:10Z/
url https://curl.se/docs/CVE-2026-3805.html
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://hackerone.com/reports/3591944
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:45:10Z/
url https://hackerone.com/reports/3591944
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2446451
reference_id 2446451
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2446451
6
reference_url https://curl.se/docs/CVE-2026-3805.json
reference_id CVE-2026-3805.json
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:45:10Z/
url https://curl.se/docs/CVE-2026-3805.json
7
reference_url https://usn.ubuntu.com/8084-1/
reference_id USN-8084-1
reference_type
scores
url https://usn.ubuntu.com/8084-1/
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2026-3805
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-amgy-dw6h-6ydf
51
url VCID-arjz-67yz-wkg9
vulnerability_id VCID-arjz-67yz-wkg9
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27533.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27533.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27533
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.40463
published_at 2026-04-16T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.40439
published_at 2026-04-02T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.40465
published_at 2026-04-04T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40389
published_at 2026-04-07T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.4044
published_at 2026-04-08T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40451
published_at 2026-04-09T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.40472
published_at 2026-04-11T12:55:00Z
7
value 0.00186
scoring_system epss
scoring_elements 0.40434
published_at 2026-04-12T12:55:00Z
8
value 0.00186
scoring_system epss
scoring_elements 0.40415
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27533
2
reference_url https://curl.se/docs/CVE-2023-27533.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-27533.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27533
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1891474
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/
url https://hackerone.com/reports/1891474
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2179062
reference_id 2179062
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2179062
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
reference_id 36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
8
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/
url https://security.gentoo.org/glsa/202310-12
9
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
reference_id msg00025.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
10
reference_url https://security.netapp.com/advisory/ntap-20230420-0011/
reference_id ntap-20230420-0011
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/
url https://security.netapp.com/advisory/ntap-20230420-0011/
11
reference_url https://access.redhat.com/errata/RHSA-2023:3354
reference_id RHSA-2023:3354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3354
12
reference_url https://access.redhat.com/errata/RHSA-2023:3355
reference_id RHSA-2023:3355
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3355
13
reference_url https://access.redhat.com/errata/RHSA-2023:6679
reference_id RHSA-2023:6679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6679
14
reference_url https://usn.ubuntu.com/5964-1/
reference_id USN-5964-1
reference_type
scores
url https://usn.ubuntu.com/5964-1/
15
reference_url https://usn.ubuntu.com/5964-2/
reference_id USN-5964-2
reference_type
scores
url https://usn.ubuntu.com/5964-2/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u8?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u8%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-7?distro=trixie
purl pkg:deb/debian/curl@7.88.1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-7%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2023-27533
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-arjz-67yz-wkg9
52
url VCID-aua9-4frt-xugf
vulnerability_id VCID-aua9-4frt-xugf
summary curl: libcurl: Curl out of bounds read for cookie path
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9086.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9086.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-9086
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10241
published_at 2026-04-04T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10138
published_at 2026-04-07T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10177
published_at 2026-04-02T12:55:00Z
3
value 0.00046
scoring_system epss
scoring_elements 0.14098
published_at 2026-04-16T12:55:00Z
4
value 0.00046
scoring_system epss
scoring_elements 0.14303
published_at 2026-04-08T12:55:00Z
5
value 0.00046
scoring_system epss
scoring_elements 0.14356
published_at 2026-04-09T12:55:00Z
6
value 0.00046
scoring_system epss
scoring_elements 0.14302
published_at 2026-04-11T12:55:00Z
7
value 0.00046
scoring_system epss
scoring_elements 0.14264
published_at 2026-04-12T12:55:00Z
8
value 0.00046
scoring_system epss
scoring_elements 0.14208
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-9086
2
reference_url https://curl.se/docs/CVE-2025-9086.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-12T17:15:47Z/
url https://curl.se/docs/CVE-2025-9086.html
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://hackerone.com/reports/3294999
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-12T17:15:47Z/
url https://hackerone.com/reports/3294999
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2394750
reference_id 2394750
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2394750
6
reference_url https://curl.se/docs/CVE-2025-9086.json
reference_id CVE-2025-9086.json
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-12T17:15:47Z/
url https://curl.se/docs/CVE-2025-9086.json
7
reference_url https://access.redhat.com/errata/RHSA-2025:23043
reference_id RHSA-2025:23043
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23043
8
reference_url https://access.redhat.com/errata/RHSA-2025:23125
reference_id RHSA-2025:23125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23125
9
reference_url https://access.redhat.com/errata/RHSA-2025:23126
reference_id RHSA-2025:23126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23126
10
reference_url https://access.redhat.com/errata/RHSA-2025:23127
reference_id RHSA-2025:23127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23127
11
reference_url https://access.redhat.com/errata/RHSA-2025:23383
reference_id RHSA-2025:23383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23383
12
reference_url https://access.redhat.com/errata/RHSA-2026:1350
reference_id RHSA-2026:1350
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1350
13
reference_url https://access.redhat.com/errata/RHSA-2026:1477
reference_id RHSA-2026:1477
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1477
14
reference_url https://access.redhat.com/errata/RHSA-2026:1736
reference_id RHSA-2026:1736
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1736
15
reference_url https://access.redhat.com/errata/RHSA-2026:1825
reference_id RHSA-2026:1825
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:1825
16
reference_url https://access.redhat.com/errata/RHSA-2026:2485
reference_id RHSA-2026:2485
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2485
17
reference_url https://access.redhat.com/errata/RHSA-2026:2563
reference_id RHSA-2026:2563
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:2563
18
reference_url https://access.redhat.com/errata/RHSA-2026:4943
reference_id RHSA-2026:4943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4943
19
reference_url https://usn.ubuntu.com/8062-1/
reference_id USN-8062-1
reference_type
scores
url https://usn.ubuntu.com/8062-1/
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.16.0~rc2-1?distro=trixie
purl pkg:deb/debian/curl@8.16.0~rc2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.16.0~rc2-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
7
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2025-9086
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aua9-4frt-xugf
53
url VCID-b2ef-zj3u-rbhy
vulnerability_id VCID-b2ef-zj3u-rbhy
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url http://curl.haxx.se/docs/adv_20160127A.html
reference_id
reference_type
scores
url http://curl.haxx.se/docs/adv_20160127A.html
1
reference_url http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html
9
reference_url http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0755.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0755.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0755
reference_id
reference_type
scores
0
value 0.00412
scoring_system epss
scoring_elements 0.61492
published_at 2026-04-16T12:55:00Z
1
value 0.00412
scoring_system epss
scoring_elements 0.61471
published_at 2026-04-12T12:55:00Z
2
value 0.00412
scoring_system epss
scoring_elements 0.61452
published_at 2026-04-13T12:55:00Z
3
value 0.00412
scoring_system epss
scoring_elements 0.61326
published_at 2026-04-01T12:55:00Z
4
value 0.00412
scoring_system epss
scoring_elements 0.61402
published_at 2026-04-02T12:55:00Z
5
value 0.00412
scoring_system epss
scoring_elements 0.61431
published_at 2026-04-04T12:55:00Z
6
value 0.00412
scoring_system epss
scoring_elements 0.61401
published_at 2026-04-07T12:55:00Z
7
value 0.00412
scoring_system epss
scoring_elements 0.61447
published_at 2026-04-08T12:55:00Z
8
value 0.00412
scoring_system epss
scoring_elements 0.61463
published_at 2026-04-09T12:55:00Z
9
value 0.00412
scoring_system epss
scoring_elements 0.61484
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0755
12
reference_url https://curl.se/docs/CVE-2016-0755.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-0755.html
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755
14
reference_url https://support.apple.com/HT207170
reference_id
reference_type
scores
url https://support.apple.com/HT207170
15
reference_url http://www.debian.org/security/2016/dsa-3455
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3455
16
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
17
reference_url http://www.securityfocus.com/bid/82307
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/82307
18
reference_url http://www.securitytracker.com/id/1034882
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034882
19
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965
20
reference_url http://www.ubuntu.com/usn/USN-2882-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2882-1
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1302263
reference_id 1302263
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1302263
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0755
reference_id CVE-2016-0755
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2016-0755
29
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
30
reference_url https://usn.ubuntu.com/2882-1/
reference_id USN-2882-1
reference_type
scores
url https://usn.ubuntu.com/2882-1/
fixed_packages
0
url pkg:deb/debian/curl@7.47.0-1?distro=trixie
purl pkg:deb/debian/curl@7.47.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.47.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-0755
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b2ef-zj3u-rbhy
54
url VCID-b69q-9yrr-myf7
vulnerability_id VCID-b69q-9yrr-myf7
summary Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0853.json
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0853.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0853
reference_id
reference_type
scores
0
value 0.00156
scoring_system epss
scoring_elements 0.3637
published_at 2026-04-16T12:55:00Z
1
value 0.00156
scoring_system epss
scoring_elements 0.36442
published_at 2026-04-02T12:55:00Z
2
value 0.00156
scoring_system epss
scoring_elements 0.36475
published_at 2026-04-04T12:55:00Z
3
value 0.00156
scoring_system epss
scoring_elements 0.3631
published_at 2026-04-07T12:55:00Z
4
value 0.00156
scoring_system epss
scoring_elements 0.36358
published_at 2026-04-08T12:55:00Z
5
value 0.00156
scoring_system epss
scoring_elements 0.36378
published_at 2026-04-09T12:55:00Z
6
value 0.00156
scoring_system epss
scoring_elements 0.36385
published_at 2026-04-11T12:55:00Z
7
value 0.00156
scoring_system epss
scoring_elements 0.3635
published_at 2026-04-12T12:55:00Z
8
value 0.00156
scoring_system epss
scoring_elements 0.36328
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0853
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2262097
reference_id 2262097
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2262097
4
reference_url https://hackerone.com/reports/2298922
reference_id 2298922
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:54:33Z/
url https://hackerone.com/reports/2298922
5
reference_url https://curl.se/docs/CVE-2024-0853.html
reference_id CVE-2024-0853.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:54:33Z/
url https://curl.se/docs/CVE-2024-0853.html
6
reference_url https://curl.se/docs/CVE-2024-0853.json
reference_id CVE-2024-0853.json
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:54:33Z/
url https://curl.se/docs/CVE-2024-0853.json
7
reference_url https://security.gentoo.org/glsa/202409-20
reference_id GLSA-202409-20
reference_type
scores
url https://security.gentoo.org/glsa/202409-20
8
reference_url https://security.netapp.com/advisory/ntap-20240307-0004/
reference_id ntap-20240307-0004
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:54:33Z/
url https://security.netapp.com/advisory/ntap-20240307-0004/
9
reference_url https://security.netapp.com/advisory/ntap-20240426-0009/
reference_id ntap-20240426-0009
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:54:33Z/
url https://security.netapp.com/advisory/ntap-20240426-0009/
10
reference_url https://security.netapp.com/advisory/ntap-20240503-0012/
reference_id ntap-20240503-0012
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:54:33Z/
url https://security.netapp.com/advisory/ntap-20240503-0012/
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.6.0-1?distro=trixie
purl pkg:deb/debian/curl@8.6.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.6.0-1%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2024-0853
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b69q-9yrr-myf7
55
url VCID-bb2f-7qrm-1kca
vulnerability_id VCID-bb2f-7qrm-1kca
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27781.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27781
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.23006
published_at 2026-04-16T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.23085
published_at 2026-04-11T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.23049
published_at 2026-04-12T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.22992
published_at 2026-04-13T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.23104
published_at 2026-04-02T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.23149
published_at 2026-04-04T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.2294
published_at 2026-04-07T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.23013
published_at 2026-04-08T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.23066
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27781
2
reference_url https://curl.se/docs/CVE-2022-27781.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-27781.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1555441
reference_id
reference_type
scores
url https://hackerone.com/reports/1555441
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082204
reference_id 2082204
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082204
21
reference_url https://security.archlinux.org/AVG-2706
reference_id AVG-2706
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2706
22
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
url https://security.gentoo.org/glsa/202212-01
23
reference_url https://access.redhat.com/errata/RHSA-2022:8840
reference_id RHSA-2022:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8840
24
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
25
reference_url https://usn.ubuntu.com/5412-1/
reference_id USN-5412-1
reference_type
scores
url https://usn.ubuntu.com/5412-1/
26
reference_url https://usn.ubuntu.com/5499-1/
reference_id USN-5499-1
reference_type
scores
url https://usn.ubuntu.com/5499-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.83.1-1?distro=trixie
purl pkg:deb/debian/curl@7.83.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.1-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2022-27781
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bb2f-7qrm-1kca
56
url VCID-bdrx-sm6b-sken
vulnerability_id VCID-bdrx-sm6b-sken
summary
Multiple vulnerabilities have been found in cURL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6422.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6422.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6422
reference_id
reference_type
scores
0
value 0.00253
scoring_system epss
scoring_elements 0.48719
published_at 2026-04-16T12:55:00Z
1
value 0.00253
scoring_system epss
scoring_elements 0.486
published_at 2026-04-01T12:55:00Z
2
value 0.00253
scoring_system epss
scoring_elements 0.48641
published_at 2026-04-02T12:55:00Z
3
value 0.00253
scoring_system epss
scoring_elements 0.48663
published_at 2026-04-04T12:55:00Z
4
value 0.00253
scoring_system epss
scoring_elements 0.48615
published_at 2026-04-07T12:55:00Z
5
value 0.00253
scoring_system epss
scoring_elements 0.48669
published_at 2026-04-08T12:55:00Z
6
value 0.00253
scoring_system epss
scoring_elements 0.48666
published_at 2026-04-09T12:55:00Z
7
value 0.00253
scoring_system epss
scoring_elements 0.48684
published_at 2026-04-11T12:55:00Z
8
value 0.00253
scoring_system epss
scoring_elements 0.48658
published_at 2026-04-12T12:55:00Z
9
value 0.00253
scoring_system epss
scoring_elements 0.4867
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6422
2
reference_url https://curl.se/docs/CVE-2013-6422.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2013-6422.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6422
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6422
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1037918
reference_id 1037918
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1037918
5
reference_url https://security.gentoo.org/glsa/201401-14
reference_id GLSA-201401-14
reference_type
scores
url https://security.gentoo.org/glsa/201401-14
6
reference_url https://usn.ubuntu.com/2058-1/
reference_id USN-2058-1
reference_type
scores
url https://usn.ubuntu.com/2058-1/
fixed_packages
0
url pkg:deb/debian/curl@7.34.0-1?distro=trixie
purl pkg:deb/debian/curl@7.34.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.34.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2013-6422
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdrx-sm6b-sken
57
url VCID-bdy2-8gub-tfe6
vulnerability_id VCID-bdy2-8gub-tfe6
summary
Double Free
When sending data to an MQTT server, libcurl could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22945.json
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22945.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22945
reference_id
reference_type
scores
0
value 0.00353
scoring_system epss
scoring_elements 0.57605
published_at 2026-04-01T12:55:00Z
1
value 0.00353
scoring_system epss
scoring_elements 0.57712
published_at 2026-04-04T12:55:00Z
2
value 0.00353
scoring_system epss
scoring_elements 0.57748
published_at 2026-04-16T12:55:00Z
3
value 0.00353
scoring_system epss
scoring_elements 0.57719
published_at 2026-04-13T12:55:00Z
4
value 0.00353
scoring_system epss
scoring_elements 0.57738
published_at 2026-04-12T12:55:00Z
5
value 0.00353
scoring_system epss
scoring_elements 0.57759
published_at 2026-04-11T12:55:00Z
6
value 0.00353
scoring_system epss
scoring_elements 0.57743
published_at 2026-04-09T12:55:00Z
7
value 0.00353
scoring_system epss
scoring_elements 0.57741
published_at 2026-04-08T12:55:00Z
8
value 0.00353
scoring_system epss
scoring_elements 0.5769
published_at 2026-04-02T12:55:00Z
9
value 0.00353
scoring_system epss
scoring_elements 0.57686
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22945
2
reference_url https://curl.se/docs/CVE-2021-22945.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22945.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1269242
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/
url https://hackerone.com/reports/1269242
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2001527
reference_id 2001527
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2001527
21
reference_url http://seclists.org/fulldisclosure/2022/Mar/29
reference_id 29
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/
url http://seclists.org/fulldisclosure/2022/Mar/29
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
reference_id APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
23
reference_url https://security.archlinux.org/AVG-2384
reference_id AVG-2384
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2384
24
reference_url https://security.archlinux.org/AVG-2385
reference_id AVG-2385
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2385
25
reference_url https://security.archlinux.org/AVG-2386
reference_id AVG-2386
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2386
26
reference_url https://security.archlinux.org/AVG-2387
reference_id AVG-2387
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2387
27
reference_url https://security.archlinux.org/AVG-2388
reference_id AVG-2388
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2388
28
reference_url https://security.archlinux.org/AVG-2389
reference_id AVG-2389
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2389
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-22945
reference_id CVE-2021-22945
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-22945
30
reference_url https://www.debian.org/security/2022/dsa-5197
reference_id dsa-5197
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/
url https://www.debian.org/security/2022/dsa-5197
31
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/
url https://security.gentoo.org/glsa/202212-01
32
reference_url https://support.apple.com/kb/HT213183
reference_id HT213183
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/
url https://support.apple.com/kb/HT213183
33
reference_url https://security.netapp.com/advisory/ntap-20211029-0003/
reference_id ntap-20211029-0003
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/
url https://security.netapp.com/advisory/ntap-20211029-0003/
34
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
reference_id RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
35
reference_url https://usn.ubuntu.com/5079-1/
reference_id USN-5079-1
reference_type
scores
url https://usn.ubuntu.com/5079-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.79.1-1?distro=trixie
purl pkg:deb/debian/curl@7.79.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.79.1-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2021-22945
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bdy2-8gub-tfe6
58
url VCID-bgtv-jrna-9yb3
vulnerability_id VCID-bgtv-jrna-9yb3
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5421.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5421.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5421
reference_id
reference_type
scores
0
value 0.01296
scoring_system epss
scoring_elements 0.79647
published_at 2026-04-01T12:55:00Z
1
value 0.01296
scoring_system epss
scoring_elements 0.79723
published_at 2026-04-16T12:55:00Z
2
value 0.01296
scoring_system epss
scoring_elements 0.79702
published_at 2026-04-12T12:55:00Z
3
value 0.01296
scoring_system epss
scoring_elements 0.79695
published_at 2026-04-13T12:55:00Z
4
value 0.01296
scoring_system epss
scoring_elements 0.79653
published_at 2026-04-02T12:55:00Z
5
value 0.01296
scoring_system epss
scoring_elements 0.79675
published_at 2026-04-04T12:55:00Z
6
value 0.01296
scoring_system epss
scoring_elements 0.79661
published_at 2026-04-07T12:55:00Z
7
value 0.01296
scoring_system epss
scoring_elements 0.7969
published_at 2026-04-08T12:55:00Z
8
value 0.01296
scoring_system epss
scoring_elements 0.79697
published_at 2026-04-09T12:55:00Z
9
value 0.01296
scoring_system epss
scoring_elements 0.79718
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5421
2
reference_url https://curl.se/docs/CVE-2016-5421.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-5421.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1362199
reference_id 1362199
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1362199
8
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
9
reference_url https://usn.ubuntu.com/3048-1/
reference_id USN-3048-1
reference_type
scores
url https://usn.ubuntu.com/3048-1/
fixed_packages
0
url pkg:deb/debian/curl@7.50.1-1?distro=trixie
purl pkg:deb/debian/curl@7.50.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.50.1-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-5421
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bgtv-jrna-9yb3
59
url VCID-bhvd-ntxz-dkg4
vulnerability_id VCID-bhvd-ntxz-dkg4
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3558
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8816.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8816.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8816
reference_id
reference_type
scores
0
value 0.00454
scoring_system epss
scoring_elements 0.63733
published_at 2026-04-01T12:55:00Z
1
value 0.00454
scoring_system epss
scoring_elements 0.63848
published_at 2026-04-16T12:55:00Z
2
value 0.00454
scoring_system epss
scoring_elements 0.63794
published_at 2026-04-02T12:55:00Z
3
value 0.00454
scoring_system epss
scoring_elements 0.63821
published_at 2026-04-04T12:55:00Z
4
value 0.00454
scoring_system epss
scoring_elements 0.63778
published_at 2026-04-07T12:55:00Z
5
value 0.00454
scoring_system epss
scoring_elements 0.63829
published_at 2026-04-08T12:55:00Z
6
value 0.00454
scoring_system epss
scoring_elements 0.63846
published_at 2026-04-12T12:55:00Z
7
value 0.00454
scoring_system epss
scoring_elements 0.6386
published_at 2026-04-11T12:55:00Z
8
value 0.00454
scoring_system epss
scoring_elements 0.63812
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8816
3
reference_url https://curl.haxx.se/docs/adv_2017-12e7.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_2017-12e7.html
4
reference_url https://curl.se/docs/CVE-2017-8816.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2017-8816.html
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8816
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817
7
reference_url http://security.cucumberlinux.com/security/details.php?id=161
reference_id
reference_type
scores
url http://security.cucumberlinux.com/security/details.php?id=161
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://www.debian.org/security/2017/dsa-4051
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4051
10
reference_url http://www.securityfocus.com/bid/101998
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101998
11
reference_url http://www.securitytracker.com/id/1039896
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039896
12
reference_url http://www.securitytracker.com/id/1040608
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040608
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1515757
reference_id 1515757
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1515757
14
reference_url https://security.archlinux.org/ASA-201711-36
reference_id ASA-201711-36
reference_type
scores
url https://security.archlinux.org/ASA-201711-36
15
reference_url https://security.archlinux.org/ASA-201711-37
reference_id ASA-201711-37
reference_type
scores
url https://security.archlinux.org/ASA-201711-37
16
reference_url https://security.archlinux.org/ASA-201711-38
reference_id ASA-201711-38
reference_type
scores
url https://security.archlinux.org/ASA-201711-38
17
reference_url https://security.archlinux.org/AVG-521
reference_id AVG-521
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-521
18
reference_url https://security.archlinux.org/AVG-522
reference_id AVG-522
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-522
19
reference_url https://security.archlinux.org/AVG-523
reference_id AVG-523
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-523
20
reference_url https://security.archlinux.org/AVG-527
reference_id AVG-527
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-527
21
reference_url https://security.archlinux.org/AVG-528
reference_id AVG-528
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-528
22
reference_url https://security.archlinux.org/AVG-529
reference_id AVG-529
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-529
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8816
reference_id CVE-2017-8816
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8816
28
reference_url https://security.gentoo.org/glsa/201712-04
reference_id GLSA-201712-04
reference_type
scores
url https://security.gentoo.org/glsa/201712-04
29
reference_url https://usn.ubuntu.com/3498-1/
reference_id USN-3498-1
reference_type
scores
url https://usn.ubuntu.com/3498-1/
fixed_packages
0
url pkg:deb/debian/curl@7.57.0-1?distro=trixie
purl pkg:deb/debian/curl@7.57.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.57.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2017-8816
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bhvd-ntxz-dkg4
60
url VCID-bv57-gvfs-qfhj
vulnerability_id VCID-bv57-gvfs-qfhj
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000121.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000121.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000121
reference_id
reference_type
scores
0
value 0.03154
scoring_system epss
scoring_elements 0.86848
published_at 2026-04-01T12:55:00Z
1
value 0.03154
scoring_system epss
scoring_elements 0.86919
published_at 2026-04-16T12:55:00Z
2
value 0.03154
scoring_system epss
scoring_elements 0.86858
published_at 2026-04-02T12:55:00Z
3
value 0.03154
scoring_system epss
scoring_elements 0.86877
published_at 2026-04-04T12:55:00Z
4
value 0.03154
scoring_system epss
scoring_elements 0.86872
published_at 2026-04-07T12:55:00Z
5
value 0.03154
scoring_system epss
scoring_elements 0.86891
published_at 2026-04-08T12:55:00Z
6
value 0.03154
scoring_system epss
scoring_elements 0.869
published_at 2026-04-09T12:55:00Z
7
value 0.03154
scoring_system epss
scoring_elements 0.86913
published_at 2026-04-11T12:55:00Z
8
value 0.03154
scoring_system epss
scoring_elements 0.86908
published_at 2026-04-12T12:55:00Z
9
value 0.03154
scoring_system epss
scoring_elements 0.86902
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000121
2
reference_url https://curl.se/docs/CVE-2018-1000121.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-1000121.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1552631
reference_id 1552631
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1552631
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546
reference_id 893546
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546
9
reference_url https://security.archlinux.org/ASA-201803-15
reference_id ASA-201803-15
reference_type
scores
url https://security.archlinux.org/ASA-201803-15
10
reference_url https://security.archlinux.org/ASA-201803-16
reference_id ASA-201803-16
reference_type
scores
url https://security.archlinux.org/ASA-201803-16
11
reference_url https://security.archlinux.org/ASA-201803-17
reference_id ASA-201803-17
reference_type
scores
url https://security.archlinux.org/ASA-201803-17
12
reference_url https://security.archlinux.org/ASA-201803-18
reference_id ASA-201803-18
reference_type
scores
url https://security.archlinux.org/ASA-201803-18
13
reference_url https://security.archlinux.org/ASA-201803-19
reference_id ASA-201803-19
reference_type
scores
url https://security.archlinux.org/ASA-201803-19
14
reference_url https://security.archlinux.org/ASA-201803-20
reference_id ASA-201803-20
reference_type
scores
url https://security.archlinux.org/ASA-201803-20
15
reference_url https://security.archlinux.org/AVG-653
reference_id AVG-653
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-653
16
reference_url https://security.archlinux.org/AVG-654
reference_id AVG-654
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-654
17
reference_url https://security.archlinux.org/AVG-655
reference_id AVG-655
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-655
18
reference_url https://security.archlinux.org/AVG-656
reference_id AVG-656
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-656
19
reference_url https://security.archlinux.org/AVG-660
reference_id AVG-660
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-660
20
reference_url https://security.archlinux.org/AVG-661
reference_id AVG-661
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-661
21
reference_url https://security.gentoo.org/glsa/201804-04
reference_id GLSA-201804-04
reference_type
scores
url https://security.gentoo.org/glsa/201804-04
fixed_packages
0
url pkg:deb/debian/curl@7.60.0-1?distro=trixie
purl pkg:deb/debian/curl@7.60.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.60.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2018-1000121
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bv57-gvfs-qfhj
61
url VCID-bvgs-71kb-mbcx
vulnerability_id VCID-bvgs-71kb-mbcx
summary security flaw
references
0
reference_url http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000940
reference_id
reference_type
scores
url http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000940
1
reference_url http://marc.info/?l=full-disclosure&m=110959085507755&w=2
reference_id
reference_type
scores
url http://marc.info/?l=full-disclosure&m=110959085507755&w=2
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0490.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0490.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0490
reference_id
reference_type
scores
0
value 0.02576
scoring_system epss
scoring_elements 0.85577
published_at 2026-04-16T12:55:00Z
1
value 0.02576
scoring_system epss
scoring_elements 0.8556
published_at 2026-04-11T12:55:00Z
2
value 0.02576
scoring_system epss
scoring_elements 0.85557
published_at 2026-04-12T12:55:00Z
3
value 0.02576
scoring_system epss
scoring_elements 0.85553
published_at 2026-04-13T12:55:00Z
4
value 0.02576
scoring_system epss
scoring_elements 0.85483
published_at 2026-04-01T12:55:00Z
5
value 0.02576
scoring_system epss
scoring_elements 0.85495
published_at 2026-04-02T12:55:00Z
6
value 0.02576
scoring_system epss
scoring_elements 0.85512
published_at 2026-04-04T12:55:00Z
7
value 0.02576
scoring_system epss
scoring_elements 0.85516
published_at 2026-04-07T12:55:00Z
8
value 0.02576
scoring_system epss
scoring_elements 0.85536
published_at 2026-04-08T12:55:00Z
9
value 0.02576
scoring_system epss
scoring_elements 0.85545
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0490
4
reference_url https://curl.se/docs/CVE-2005-0490.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2005-0490.html
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0490
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/19423
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/19423
7
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273
8
reference_url http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml
9
reference_url http://www.idefense.com/application/poi/display?id=202&type=vulnerabilities
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=202&type=vulnerabilities
10
reference_url http://www.idefense.com/application/poi/display?id=203&type=vulnerabilities
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=203&type=vulnerabilities
11
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:048
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:048
12
reference_url http://www.novell.com/linux/security/advisories/2005_11_curl.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_11_curl.html
13
reference_url http://www.redhat.com/support/errata/RHSA-2005-340.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-340.html
14
reference_url http://www.securityfocus.com/bid/12615
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/12615
15
reference_url http://www.securityfocus.com/bid/12616
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/12616
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617532
reference_id 1617532
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617532
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0490
reference_id CVE-2005-0490
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2005-0490
20
reference_url https://access.redhat.com/errata/RHSA-2005:340
reference_id RHSA-2005:340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:340
21
reference_url https://usn.ubuntu.com/86-1/
reference_id USN-86-1
reference_type
scores
url https://usn.ubuntu.com/86-1/
fixed_packages
0
url pkg:deb/debian/curl@7.13.0-2?distro=trixie
purl pkg:deb/debian/curl@7.13.0-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.13.0-2%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2005-0490
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bvgs-71kb-mbcx
62
url VCID-bz4u-6rft-s3a8
vulnerability_id VCID-bz4u-6rft-s3a8
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38039.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38039.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38039
reference_id
reference_type
scores
0
value 0.12305
scoring_system epss
scoring_elements 0.93887
published_at 2026-04-16T12:55:00Z
1
value 0.12305
scoring_system epss
scoring_elements 0.93835
published_at 2026-04-02T12:55:00Z
2
value 0.12305
scoring_system epss
scoring_elements 0.93845
published_at 2026-04-04T12:55:00Z
3
value 0.12305
scoring_system epss
scoring_elements 0.93847
published_at 2026-04-07T12:55:00Z
4
value 0.12305
scoring_system epss
scoring_elements 0.93856
published_at 2026-04-08T12:55:00Z
5
value 0.12305
scoring_system epss
scoring_elements 0.9386
published_at 2026-04-09T12:55:00Z
6
value 0.12305
scoring_system epss
scoring_elements 0.93865
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38039
2
reference_url https://curl.se/docs/CVE-2023-38039.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-38039.html
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://hackerone.com/reports/2072338
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/
url https://hackerone.com/reports/2072338
5
reference_url http://seclists.org/fulldisclosure/2023/Oct/17
reference_id 17
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/
url http://seclists.org/fulldisclosure/2023/Oct/17
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2239135
reference_id 2239135
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2239135
7
reference_url http://seclists.org/fulldisclosure/2024/Jan/34
reference_id 34
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/
url http://seclists.org/fulldisclosure/2024/Jan/34
8
reference_url http://seclists.org/fulldisclosure/2024/Jan/37
reference_id 37
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/
url http://seclists.org/fulldisclosure/2024/Jan/37
9
reference_url http://seclists.org/fulldisclosure/2024/Jan/38
reference_id 38
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/
url http://seclists.org/fulldisclosure/2024/Jan/38
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/
reference_id 5DCZMYODALBLVOXVJEN2LF2MLANEYL4F
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/
11
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/
url https://security.gentoo.org/glsa/202310-12
12
reference_url https://support.apple.com/kb/HT214036
reference_id HT214036
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/
url https://support.apple.com/kb/HT214036
13
reference_url https://support.apple.com/kb/HT214057
reference_id HT214057
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/
url https://support.apple.com/kb/HT214057
14
reference_url https://support.apple.com/kb/HT214058
reference_id HT214058
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/
url https://support.apple.com/kb/HT214058
15
reference_url https://support.apple.com/kb/HT214063
reference_id HT214063
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/
url https://support.apple.com/kb/HT214063
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/
reference_id M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/
17
reference_url https://security.netapp.com/advisory/ntap-20231013-0005/
reference_id ntap-20231013-0005
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/
url https://security.netapp.com/advisory/ntap-20231013-0005/
18
reference_url https://access.redhat.com/errata/RHSA-2023:7625
reference_id RHSA-2023:7625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7625
19
reference_url https://access.redhat.com/errata/RHSA-2023:7626
reference_id RHSA-2023:7626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7626
20
reference_url https://www.insyde.com/security-pledge/SA-2023064
reference_id SA-2023064
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/
url https://www.insyde.com/security-pledge/SA-2023064
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/
reference_id TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/
22
reference_url https://usn.ubuntu.com/6363-1/
reference_id USN-6363-1
reference_type
scores
url https://usn.ubuntu.com/6363-1/
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.3.0-1?distro=trixie
purl pkg:deb/debian/curl@8.3.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.3.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
7
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2023-38039
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bz4u-6rft-s3a8
63
url VCID-c2na-7q9e-47am
vulnerability_id VCID-c2na-7q9e-47am
summary information disclosure
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0015.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0015.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0015
reference_id
reference_type
scores
0
value 0.01396
scoring_system epss
scoring_elements 0.80422
published_at 2026-04-16T12:55:00Z
1
value 0.01396
scoring_system epss
scoring_elements 0.80393
published_at 2026-04-13T12:55:00Z
2
value 0.01396
scoring_system epss
scoring_elements 0.80342
published_at 2026-04-01T12:55:00Z
3
value 0.01396
scoring_system epss
scoring_elements 0.80348
published_at 2026-04-02T12:55:00Z
4
value 0.01396
scoring_system epss
scoring_elements 0.80368
published_at 2026-04-04T12:55:00Z
5
value 0.01396
scoring_system epss
scoring_elements 0.80357
published_at 2026-04-07T12:55:00Z
6
value 0.01396
scoring_system epss
scoring_elements 0.80386
published_at 2026-04-08T12:55:00Z
7
value 0.01396
scoring_system epss
scoring_elements 0.80396
published_at 2026-04-09T12:55:00Z
8
value 0.01396
scoring_system epss
scoring_elements 0.80415
published_at 2026-04-11T12:55:00Z
9
value 0.01396
scoring_system epss
scoring_elements 0.804
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0015
2
reference_url https://curl.se/docs/CVE-2014-0015.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2014-0015.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1053903
reference_id 1053903
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1053903
6
reference_url https://access.redhat.com/errata/RHSA-2014:0561
reference_id RHSA-2014:0561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0561
7
reference_url https://usn.ubuntu.com/2097-1/
reference_id USN-2097-1
reference_type
scores
url https://usn.ubuntu.com/2097-1/
fixed_packages
0
url pkg:deb/debian/curl@7.35.0-1?distro=trixie
purl pkg:deb/debian/curl@7.35.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.35.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2014-0015
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c2na-7q9e-47am
64
url VCID-c6dk-7gj6-7far
vulnerability_id VCID-c6dk-7gj6-7far
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8623.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8623.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8623
reference_id
reference_type
scores
0
value 0.00837
scoring_system epss
scoring_elements 0.74617
published_at 2026-04-01T12:55:00Z
1
value 0.00837
scoring_system epss
scoring_elements 0.74699
published_at 2026-04-16T12:55:00Z
2
value 0.00837
scoring_system epss
scoring_elements 0.74621
published_at 2026-04-07T12:55:00Z
3
value 0.00837
scoring_system epss
scoring_elements 0.74647
published_at 2026-04-04T12:55:00Z
4
value 0.00837
scoring_system epss
scoring_elements 0.74653
published_at 2026-04-08T12:55:00Z
5
value 0.00837
scoring_system epss
scoring_elements 0.74667
published_at 2026-04-09T12:55:00Z
6
value 0.00837
scoring_system epss
scoring_elements 0.7469
published_at 2026-04-11T12:55:00Z
7
value 0.00837
scoring_system epss
scoring_elements 0.7467
published_at 2026-04-12T12:55:00Z
8
value 0.00837
scoring_system epss
scoring_elements 0.74662
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8623
2
reference_url https://curl.se/docs/CVE-2016-8623.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8623.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388388
reference_id 1388388
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388388
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
20
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
21
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
22
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
23
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
24
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
25
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
26
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
27
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
28
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:deb/debian/curl@7.51.0-1?distro=trixie
purl pkg:deb/debian/curl@7.51.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-8623
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c6dk-7gj6-7far
65
url VCID-cbah-e86c-w3fj
vulnerability_id VCID-cbah-e86c-w3fj
summary
Improper Authentication
An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27535.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27535.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27535
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20226
published_at 2026-04-16T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20386
published_at 2026-04-02T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20446
published_at 2026-04-04T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.2017
published_at 2026-04-07T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20251
published_at 2026-04-08T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20311
published_at 2026-04-09T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20341
published_at 2026-04-11T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20295
published_at 2026-04-12T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20236
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27535
2
reference_url https://curl.se/docs/CVE-2023-27535.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-27535.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27535
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1892780
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/
url https://hackerone.com/reports/1892780
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2179073
reference_id 2179073
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2179073
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
reference_id 36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-27535
reference_id CVE-2023-27535
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-27535
10
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/
url https://security.gentoo.org/glsa/202310-12
11
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
reference_id msg00025.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
12
reference_url https://security.netapp.com/advisory/ntap-20230420-0010/
reference_id ntap-20230420-0010
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/
url https://security.netapp.com/advisory/ntap-20230420-0010/
13
reference_url https://access.redhat.com/errata/RHSA-2023:2650
reference_id RHSA-2023:2650
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2650
14
reference_url https://access.redhat.com/errata/RHSA-2023:3106
reference_id RHSA-2023:3106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3106
15
reference_url https://access.redhat.com/errata/RHSA-2024:0428
reference_id RHSA-2024:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0428
16
reference_url https://usn.ubuntu.com/5964-1/
reference_id USN-5964-1
reference_type
scores
url https://usn.ubuntu.com/5964-1/
17
reference_url https://usn.ubuntu.com/5964-2/
reference_id USN-5964-2
reference_type
scores
url https://usn.ubuntu.com/5964-2/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u8?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u8%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-7?distro=trixie
purl pkg:deb/debian/curl@7.88.1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-7%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2023-27535
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cbah-e86c-w3fj
66
url VCID-cbph-fu9d-gbah
vulnerability_id VCID-cbph-fu9d-gbah
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000122.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000122.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000122
reference_id
reference_type
scores
0
value 0.01942
scoring_system epss
scoring_elements 0.83368
published_at 2026-04-01T12:55:00Z
1
value 0.01942
scoring_system epss
scoring_elements 0.8347
published_at 2026-04-16T12:55:00Z
2
value 0.01942
scoring_system epss
scoring_elements 0.83381
published_at 2026-04-02T12:55:00Z
3
value 0.01942
scoring_system epss
scoring_elements 0.83396
published_at 2026-04-07T12:55:00Z
4
value 0.01942
scoring_system epss
scoring_elements 0.8342
published_at 2026-04-08T12:55:00Z
5
value 0.01942
scoring_system epss
scoring_elements 0.8343
published_at 2026-04-09T12:55:00Z
6
value 0.01942
scoring_system epss
scoring_elements 0.83445
published_at 2026-04-11T12:55:00Z
7
value 0.01942
scoring_system epss
scoring_elements 0.83439
published_at 2026-04-12T12:55:00Z
8
value 0.01942
scoring_system epss
scoring_elements 0.83435
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000122
2
reference_url https://curl.se/docs/CVE-2018-1000122.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-1000122.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1553398
reference_id 1553398
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1553398
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546
reference_id 893546
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546
9
reference_url https://security.archlinux.org/ASA-201803-15
reference_id ASA-201803-15
reference_type
scores
url https://security.archlinux.org/ASA-201803-15
10
reference_url https://security.archlinux.org/ASA-201803-16
reference_id ASA-201803-16
reference_type
scores
url https://security.archlinux.org/ASA-201803-16
11
reference_url https://security.archlinux.org/ASA-201803-17
reference_id ASA-201803-17
reference_type
scores
url https://security.archlinux.org/ASA-201803-17
12
reference_url https://security.archlinux.org/ASA-201803-18
reference_id ASA-201803-18
reference_type
scores
url https://security.archlinux.org/ASA-201803-18
13
reference_url https://security.archlinux.org/ASA-201803-19
reference_id ASA-201803-19
reference_type
scores
url https://security.archlinux.org/ASA-201803-19
14
reference_url https://security.archlinux.org/ASA-201803-20
reference_id ASA-201803-20
reference_type
scores
url https://security.archlinux.org/ASA-201803-20
15
reference_url https://security.archlinux.org/AVG-653
reference_id AVG-653
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-653
16
reference_url https://security.archlinux.org/AVG-654
reference_id AVG-654
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-654
17
reference_url https://security.archlinux.org/AVG-655
reference_id AVG-655
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-655
18
reference_url https://security.archlinux.org/AVG-656
reference_id AVG-656
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-656
19
reference_url https://security.archlinux.org/AVG-660
reference_id AVG-660
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-660
20
reference_url https://security.archlinux.org/AVG-661
reference_id AVG-661
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-661
21
reference_url https://security.gentoo.org/glsa/201804-04
reference_id GLSA-201804-04
reference_type
scores
url https://security.gentoo.org/glsa/201804-04
fixed_packages
0
url pkg:deb/debian/curl@7.60.0-1?distro=trixie
purl pkg:deb/debian/curl@7.60.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.60.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2018-1000122
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cbph-fu9d-gbah
67
url VCID-cp4n-p2z3-43b4
vulnerability_id VCID-cp4n-p2z3-43b4
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in information disclosure or data loss.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8177.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8177.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8177
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05444
published_at 2026-04-01T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05476
published_at 2026-04-16T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.05545
published_at 2026-04-11T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.05532
published_at 2026-04-12T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05526
published_at 2026-04-13T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05479
published_at 2026-04-02T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05514
published_at 2026-04-07T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05549
published_at 2026-04-08T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.0557
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8177
2
reference_url https://curl.se/docs/CVE-2020-8177.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2020-8177.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://hackerone.com/reports/887462
reference_id
reference_type
scores
url https://hackerone.com/reports/887462
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1847915
reference_id 1847915
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1847915
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965281
reference_id 965281
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965281
15
reference_url https://security.archlinux.org/AVG-1194
reference_id AVG-1194
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1194
16
reference_url https://security.gentoo.org/glsa/202007-16
reference_id GLSA-202007-16
reference_type
scores
url https://security.gentoo.org/glsa/202007-16
17
reference_url https://access.redhat.com/errata/RHSA-2020:4599
reference_id RHSA-2020:4599
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4599
18
reference_url https://access.redhat.com/errata/RHSA-2020:5002
reference_id RHSA-2020:5002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5002
19
reference_url https://access.redhat.com/errata/RHSA-2020:5417
reference_id RHSA-2020:5417
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5417
20
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
21
reference_url https://usn.ubuntu.com/4402-1/
reference_id USN-4402-1
reference_type
scores
url https://usn.ubuntu.com/4402-1/
fixed_packages
0
url pkg:deb/debian/curl@7.72.0-1?distro=trixie
purl pkg:deb/debian/curl@7.72.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.72.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2020-8177
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cp4n-p2z3-43b4
68
url VCID-d3s1-3qs7-2uhw
vulnerability_id VCID-d3s1-3qs7-2uhw
summary curl: Cipher settings shared for all connections when using schannel TLS backed
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22897.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22897.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22897
reference_id
reference_type
scores
0
value 0.00791
scoring_system epss
scoring_elements 0.73845
published_at 2026-04-01T12:55:00Z
1
value 0.00791
scoring_system epss
scoring_elements 0.73936
published_at 2026-04-16T12:55:00Z
2
value 0.00791
scoring_system epss
scoring_elements 0.73903
published_at 2026-04-12T12:55:00Z
3
value 0.00791
scoring_system epss
scoring_elements 0.73894
published_at 2026-04-13T12:55:00Z
4
value 0.00791
scoring_system epss
scoring_elements 0.73855
published_at 2026-04-02T12:55:00Z
5
value 0.00791
scoring_system epss
scoring_elements 0.7388
published_at 2026-04-04T12:55:00Z
6
value 0.00791
scoring_system epss
scoring_elements 0.73851
published_at 2026-04-07T12:55:00Z
7
value 0.00791
scoring_system epss
scoring_elements 0.73886
published_at 2026-04-08T12:55:00Z
8
value 0.00791
scoring_system epss
scoring_elements 0.73899
published_at 2026-04-09T12:55:00Z
9
value 0.00791
scoring_system epss
scoring_elements 0.73921
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22897
2
reference_url https://curl.se/docs/CVE-2021-22897.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22897.html
3
reference_url https://hackerone.com/reports/1172857
reference_id
reference_type
scores
url https://hackerone.com/reports/1172857
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1964904
reference_id 1964904
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1964904
5
reference_url https://security.archlinux.org/AVG-2016
reference_id AVG-2016
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2016
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2021-22897
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d3s1-3qs7-2uhw
69
url VCID-ddgz-rczw-jqfw
vulnerability_id VCID-ddgz-rczw-jqfw
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28320.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28320.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28320
reference_id
reference_type
scores
0
value 0.00538
scoring_system epss
scoring_elements 0.67581
published_at 2026-04-16T12:55:00Z
1
value 0.00538
scoring_system epss
scoring_elements 0.67504
published_at 2026-04-07T12:55:00Z
2
value 0.00538
scoring_system epss
scoring_elements 0.67526
published_at 2026-04-04T12:55:00Z
3
value 0.00538
scoring_system epss
scoring_elements 0.67556
published_at 2026-04-08T12:55:00Z
4
value 0.00538
scoring_system epss
scoring_elements 0.6757
published_at 2026-04-09T12:55:00Z
5
value 0.00538
scoring_system epss
scoring_elements 0.67592
published_at 2026-04-11T12:55:00Z
6
value 0.00538
scoring_system epss
scoring_elements 0.67579
published_at 2026-04-12T12:55:00Z
7
value 0.00538
scoring_system epss
scoring_elements 0.67546
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28320
2
reference_url https://curl.se/docs/CVE-2023-28320.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-28320.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28320
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1929597
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url https://hackerone.com/reports/1929597
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239
reference_id 1036239
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2196783
reference_id 2196783
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2196783
8
reference_url http://seclists.org/fulldisclosure/2023/Jul/47
reference_id 47
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url http://seclists.org/fulldisclosure/2023/Jul/47
9
reference_url http://seclists.org/fulldisclosure/2023/Jul/48
reference_id 48
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url http://seclists.org/fulldisclosure/2023/Jul/48
10
reference_url http://seclists.org/fulldisclosure/2023/Jul/52
reference_id 52
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url http://seclists.org/fulldisclosure/2023/Jul/52
11
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url https://security.gentoo.org/glsa/202310-12
12
reference_url https://support.apple.com/kb/HT213843
reference_id HT213843
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url https://support.apple.com/kb/HT213843
13
reference_url https://support.apple.com/kb/HT213844
reference_id HT213844
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url https://support.apple.com/kb/HT213844
14
reference_url https://support.apple.com/kb/HT213845
reference_id HT213845
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url https://support.apple.com/kb/HT213845
15
reference_url https://security.netapp.com/advisory/ntap-20230609-0009/
reference_id ntap-20230609-0009
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/
url https://security.netapp.com/advisory/ntap-20230609-0009/
fixed_packages
0
url pkg:deb/debian/curl@7.88.1-10?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
2
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2023-28320
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ddgz-rczw-jqfw
70
url VCID-dgtq-eaav-jyhf
vulnerability_id VCID-dgtq-eaav-jyhf
summary
Out-of-bounds Write
A buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that allows an attacker to cause a denial of service or worse.
references
0
reference_url https://access.redhat.com/errata/RHBA-2019:0327
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHBA-2019:0327
1
reference_url https://access.redhat.com/errata/RHSA-2018:3157
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:3157
2
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:3558
3
reference_url https://access.redhat.com/errata/RHSA-2019:1543
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:1543
4
reference_url https://access.redhat.com/errata/RHSA-2020:0544
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0544
5
reference_url https://access.redhat.com/errata/RHSA-2020:0594
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0594
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000120.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000120.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000120
reference_id
reference_type
scores
0
value 0.0154
scoring_system epss
scoring_elements 0.81402
published_at 2026-04-16T12:55:00Z
1
value 0.0154
scoring_system epss
scoring_elements 0.81302
published_at 2026-04-01T12:55:00Z
2
value 0.0154
scoring_system epss
scoring_elements 0.81312
published_at 2026-04-02T12:55:00Z
3
value 0.0154
scoring_system epss
scoring_elements 0.81334
published_at 2026-04-04T12:55:00Z
4
value 0.0154
scoring_system epss
scoring_elements 0.81332
published_at 2026-04-07T12:55:00Z
5
value 0.0154
scoring_system epss
scoring_elements 0.81361
published_at 2026-04-08T12:55:00Z
6
value 0.0154
scoring_system epss
scoring_elements 0.81366
published_at 2026-04-09T12:55:00Z
7
value 0.0154
scoring_system epss
scoring_elements 0.81387
published_at 2026-04-11T12:55:00Z
8
value 0.0154
scoring_system epss
scoring_elements 0.81372
published_at 2026-04-12T12:55:00Z
9
value 0.0154
scoring_system epss
scoring_elements 0.81365
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000120
8
reference_url https://curl.haxx.se/docs/adv_2018-9cd6.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://curl.haxx.se/docs/adv_2018-9cd6.html
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://github.com/coapp-packages/curl
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/coapp-packages/curl
14
reference_url https://lists.debian.org/debian-lts-announce/2018/03/msg00012.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2018/03/msg00012.html
15
reference_url https://usn.ubuntu.com/3598-1
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/3598-1
16
reference_url https://usn.ubuntu.com/3598-1/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3598-1/
17
reference_url https://usn.ubuntu.com/3598-2
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/3598-2
18
reference_url https://usn.ubuntu.com/3598-2/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3598-2/
19
reference_url https://web.archive.org/web/20201220134105/http://www.securitytracker.com/id/1040531
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20201220134105/http://www.securitytracker.com/id/1040531
20
reference_url https://web.archive.org/web/20201220134609/http://www.securityfocus.com/bid/103414
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20201220134609/http://www.securityfocus.com/bid/103414
21
reference_url https://www.debian.org/security/2018/dsa-4136
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2018/dsa-4136
22
reference_url https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
23
reference_url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
24
reference_url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
25
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
26
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1552628
reference_id 1552628
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1552628
28
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546
reference_id 893546
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546
29
reference_url https://security.archlinux.org/ASA-201803-15
reference_id ASA-201803-15
reference_type
scores
url https://security.archlinux.org/ASA-201803-15
30
reference_url https://security.archlinux.org/ASA-201803-16
reference_id ASA-201803-16
reference_type
scores
url https://security.archlinux.org/ASA-201803-16
31
reference_url https://security.archlinux.org/ASA-201803-17
reference_id ASA-201803-17
reference_type
scores
url https://security.archlinux.org/ASA-201803-17
32
reference_url https://security.archlinux.org/ASA-201803-18
reference_id ASA-201803-18
reference_type
scores
url https://security.archlinux.org/ASA-201803-18
33
reference_url https://security.archlinux.org/ASA-201803-19
reference_id ASA-201803-19
reference_type
scores
url https://security.archlinux.org/ASA-201803-19
34
reference_url https://security.archlinux.org/ASA-201803-20
reference_id ASA-201803-20
reference_type
scores
url https://security.archlinux.org/ASA-201803-20
35
reference_url https://security.archlinux.org/AVG-653
reference_id AVG-653
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-653
36
reference_url https://security.archlinux.org/AVG-654
reference_id AVG-654
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-654
37
reference_url https://security.archlinux.org/AVG-655
reference_id AVG-655
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-655
38
reference_url https://security.archlinux.org/AVG-656
reference_id AVG-656
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-656
39
reference_url https://security.archlinux.org/AVG-660
reference_id AVG-660
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-660
40
reference_url https://security.archlinux.org/AVG-661
reference_id AVG-661
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-661
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1000120
reference_id CVE-2018-1000120
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-1000120
42
reference_url https://curl.se/docs/CVE-2018-1000120.html
reference_id CVE-2018-1000120.HTML
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value High
scoring_system cvssv3.1
scoring_elements
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://curl.se/docs/CVE-2018-1000120.html
43
reference_url https://github.com/advisories/GHSA-674j-7m97-j2p9
reference_id GHSA-674j-7m97-j2p9
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-674j-7m97-j2p9
44
reference_url https://security.gentoo.org/glsa/201804-04
reference_id GLSA-201804-04
reference_type
scores
url https://security.gentoo.org/glsa/201804-04
fixed_packages
0
url pkg:deb/debian/curl@7.60.0-1?distro=trixie
purl pkg:deb/debian/curl@7.60.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.60.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2018-1000120, GHSA-674j-7m97-j2p9
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dgtq-eaav-jyhf
71
url VCID-dhrf-2sz5-3bhf
vulnerability_id VCID-dhrf-2sz5-3bhf
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5481.json
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5481.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-5481
reference_id
reference_type
scores
0
value 0.03017
scoring_system epss
scoring_elements 0.86623
published_at 2026-04-16T12:55:00Z
1
value 0.03017
scoring_system epss
scoring_elements 0.86617
published_at 2026-04-12T12:55:00Z
2
value 0.03017
scoring_system epss
scoring_elements 0.8661
published_at 2026-04-13T12:55:00Z
3
value 0.04042
scoring_system epss
scoring_elements 0.88452
published_at 2026-04-01T12:55:00Z
4
value 0.04042
scoring_system epss
scoring_elements 0.8846
published_at 2026-04-02T12:55:00Z
5
value 0.04042
scoring_system epss
scoring_elements 0.88476
published_at 2026-04-04T12:55:00Z
6
value 0.04042
scoring_system epss
scoring_elements 0.88479
published_at 2026-04-07T12:55:00Z
7
value 0.04042
scoring_system epss
scoring_elements 0.88497
published_at 2026-04-08T12:55:00Z
8
value 0.04042
scoring_system epss
scoring_elements 0.88503
published_at 2026-04-09T12:55:00Z
9
value 0.04042
scoring_system epss
scoring_elements 0.88514
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-5481
2
reference_url https://curl.se/docs/CVE-2019-5481.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2019-5481.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://hackerone.com/reports/686823
reference_id
reference_type
scores
url https://hackerone.com/reports/686823
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1749402
reference_id 1749402
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1749402
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940009
reference_id 940009
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940009
9
reference_url https://security.archlinux.org/AVG-1982
reference_id AVG-1982
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1982
10
reference_url https://security.gentoo.org/glsa/202003-29
reference_id GLSA-202003-29
reference_type
scores
url https://security.gentoo.org/glsa/202003-29
11
reference_url https://access.redhat.com/errata/RHSA-2020:0250
reference_id RHSA-2020:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0250
12
reference_url https://access.redhat.com/errata/RHSA-2020:1792
reference_id RHSA-2020:1792
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1792
13
reference_url https://usn.ubuntu.com/4129-1/
reference_id USN-4129-1
reference_type
scores
url https://usn.ubuntu.com/4129-1/
fixed_packages
0
url pkg:deb/debian/curl@7.66.0-1?distro=trixie
purl pkg:deb/debian/curl@7.66.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.66.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2019-5481
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dhrf-2sz5-3bhf
72
url VCID-dj5e-62rt-hkex
vulnerability_id VCID-dj5e-62rt-hkex
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which might allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0734.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0734.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0734
reference_id
reference_type
scores
0
value 0.04759
scoring_system epss
scoring_elements 0.89464
published_at 2026-04-16T12:55:00Z
1
value 0.04759
scoring_system epss
scoring_elements 0.8941
published_at 2026-04-01T12:55:00Z
2
value 0.04759
scoring_system epss
scoring_elements 0.89415
published_at 2026-04-02T12:55:00Z
3
value 0.04759
scoring_system epss
scoring_elements 0.89425
published_at 2026-04-04T12:55:00Z
4
value 0.04759
scoring_system epss
scoring_elements 0.89427
published_at 2026-04-07T12:55:00Z
5
value 0.04759
scoring_system epss
scoring_elements 0.89443
published_at 2026-04-08T12:55:00Z
6
value 0.04759
scoring_system epss
scoring_elements 0.89446
published_at 2026-04-09T12:55:00Z
7
value 0.04759
scoring_system epss
scoring_elements 0.89455
published_at 2026-04-11T12:55:00Z
8
value 0.04759
scoring_system epss
scoring_elements 0.89453
published_at 2026-04-12T12:55:00Z
9
value 0.04759
scoring_system epss
scoring_elements 0.89449
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0734
2
reference_url https://curl.se/docs/CVE-2010-0734.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2010-0734.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0734
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=563220
reference_id 563220
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=563220
5
reference_url https://security.gentoo.org/glsa/201203-02
reference_id GLSA-201203-02
reference_type
scores
url https://security.gentoo.org/glsa/201203-02
6
reference_url https://access.redhat.com/errata/RHSA-2010:0273
reference_id RHSA-2010:0273
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0273
7
reference_url https://access.redhat.com/errata/RHSA-2010:0329
reference_id RHSA-2010:0329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0329
8
reference_url https://usn.ubuntu.com/1158-1/
reference_id USN-1158-1
reference_type
scores
url https://usn.ubuntu.com/1158-1/
fixed_packages
0
url pkg:deb/debian/curl@7.20.0-1?distro=trixie
purl pkg:deb/debian/curl@7.20.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.20.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2010-0734
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dj5e-62rt-hkex
73
url VCID-drkp-q9r5-ukcm
vulnerability_id VCID-drkp-q9r5-ukcm
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8818.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8818.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8818
reference_id
reference_type
scores
0
value 0.00559
scoring_system epss
scoring_elements 0.68167
published_at 2026-04-01T12:55:00Z
1
value 0.00559
scoring_system epss
scoring_elements 0.6819
published_at 2026-04-02T12:55:00Z
2
value 0.00559
scoring_system epss
scoring_elements 0.68236
published_at 2026-04-08T12:55:00Z
3
value 0.00559
scoring_system epss
scoring_elements 0.68185
published_at 2026-04-07T12:55:00Z
4
value 0.00559
scoring_system epss
scoring_elements 0.68207
published_at 2026-04-04T12:55:00Z
5
value 0.00559
scoring_system epss
scoring_elements 0.68251
published_at 2026-04-09T12:55:00Z
6
value 0.00729
scoring_system epss
scoring_elements 0.72682
published_at 2026-04-16T12:55:00Z
7
value 0.00729
scoring_system epss
scoring_elements 0.72666
published_at 2026-04-11T12:55:00Z
8
value 0.00729
scoring_system epss
scoring_elements 0.72649
published_at 2026-04-12T12:55:00Z
9
value 0.00729
scoring_system epss
scoring_elements 0.72639
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8818
2
reference_url https://curl.haxx.se/docs/adv_2017-af0a.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_2017-af0a.html
3
reference_url https://curl.se/docs/CVE-2017-8818.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2017-8818.html
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8818
5
reference_url http://security.cucumberlinux.com/security/details.php?id=163
reference_id
reference_type
scores
url http://security.cucumberlinux.com/security/details.php?id=163
6
reference_url http://www.securityfocus.com/bid/102014
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102014
7
reference_url http://www.securitytracker.com/id/1039898
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039898
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1517691
reference_id 1517691
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1517691
9
reference_url https://security.archlinux.org/ASA-201711-36
reference_id ASA-201711-36
reference_type
scores
url https://security.archlinux.org/ASA-201711-36
10
reference_url https://security.archlinux.org/ASA-201711-37
reference_id ASA-201711-37
reference_type
scores
url https://security.archlinux.org/ASA-201711-37
11
reference_url https://security.archlinux.org/ASA-201711-38
reference_id ASA-201711-38
reference_type
scores
url https://security.archlinux.org/ASA-201711-38
12
reference_url https://security.archlinux.org/AVG-521
reference_id AVG-521
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-521
13
reference_url https://security.archlinux.org/AVG-522
reference_id AVG-522
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-522
14
reference_url https://security.archlinux.org/AVG-523
reference_id AVG-523
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-523
15
reference_url https://security.archlinux.org/AVG-527
reference_id AVG-527
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-527
16
reference_url https://security.archlinux.org/AVG-528
reference_id AVG-528
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-528
17
reference_url https://security.archlinux.org/AVG-529
reference_id AVG-529
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-529
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.56.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.56.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.56.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.56.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.56.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.56.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.56.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.56.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.56.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.56.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.56.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.56.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8818
reference_id CVE-2017-8818
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8818
23
reference_url https://security.gentoo.org/glsa/201712-04
reference_id GLSA-201712-04
reference_type
scores
url https://security.gentoo.org/glsa/201712-04
fixed_packages
0
url pkg:deb/debian/curl@7.57.0-1?distro=trixie
purl pkg:deb/debian/curl@7.57.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.57.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2017-8818
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-drkp-q9r5-ukcm
74
url VCID-dzzd-afgu-3fcy
vulnerability_id VCID-dzzd-afgu-3fcy
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8150.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8150.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8150
reference_id
reference_type
scores
0
value 0.0123
scoring_system epss
scoring_elements 0.79187
published_at 2026-04-16T12:55:00Z
1
value 0.0123
scoring_system epss
scoring_elements 0.79112
published_at 2026-04-01T12:55:00Z
2
value 0.0123
scoring_system epss
scoring_elements 0.79119
published_at 2026-04-02T12:55:00Z
3
value 0.0123
scoring_system epss
scoring_elements 0.79144
published_at 2026-04-04T12:55:00Z
4
value 0.0123
scoring_system epss
scoring_elements 0.79129
published_at 2026-04-07T12:55:00Z
5
value 0.0123
scoring_system epss
scoring_elements 0.79153
published_at 2026-04-08T12:55:00Z
6
value 0.0123
scoring_system epss
scoring_elements 0.79161
published_at 2026-04-13T12:55:00Z
7
value 0.0123
scoring_system epss
scoring_elements 0.79185
published_at 2026-04-11T12:55:00Z
8
value 0.0123
scoring_system epss
scoring_elements 0.7917
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8150
2
reference_url https://curl.se/docs/CVE-2014-8150.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2014-8150.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1178692
reference_id 1178692
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1178692
5
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
6
reference_url https://access.redhat.com/errata/RHSA-2015:1254
reference_id RHSA-2015:1254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1254
7
reference_url https://access.redhat.com/errata/RHSA-2015:2159
reference_id RHSA-2015:2159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2159
8
reference_url https://usn.ubuntu.com/2474-1/
reference_id USN-2474-1
reference_type
scores
url https://usn.ubuntu.com/2474-1/
fixed_packages
0
url pkg:deb/debian/curl@7.38.0-4?distro=trixie
purl pkg:deb/debian/curl@7.38.0-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.38.0-4%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2014-8150
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dzzd-afgu-3fcy
75
url VCID-e1yx-dxa6-1bba
vulnerability_id VCID-e1yx-dxa6-1bba
summary
Multiple vulnerabilities have been found in the Oracle JRE/JDK,
    allowing attackers to cause unspecified impact.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3389.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3389.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3389
reference_id
reference_type
scores
0
value 0.03832
scoring_system epss
scoring_elements 0.88174
published_at 2026-04-16T12:55:00Z
1
value 0.03832
scoring_system epss
scoring_elements 0.8816
published_at 2026-04-13T12:55:00Z
2
value 0.03832
scoring_system epss
scoring_elements 0.88099
published_at 2026-04-01T12:55:00Z
3
value 0.03832
scoring_system epss
scoring_elements 0.88108
published_at 2026-04-02T12:55:00Z
4
value 0.03832
scoring_system epss
scoring_elements 0.88124
published_at 2026-04-04T12:55:00Z
5
value 0.03832
scoring_system epss
scoring_elements 0.88131
published_at 2026-04-07T12:55:00Z
6
value 0.03832
scoring_system epss
scoring_elements 0.8815
published_at 2026-04-08T12:55:00Z
7
value 0.03832
scoring_system epss
scoring_elements 0.88156
published_at 2026-04-09T12:55:00Z
8
value 0.03832
scoring_system epss
scoring_elements 0.88165
published_at 2026-04-11T12:55:00Z
9
value 0.03832
scoring_system epss
scoring_elements 0.88159
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3389
2
reference_url https://curl.se/docs/CVE-2011-3389.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2011-3389.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=737506
reference_id 737506
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=737506
6
reference_url https://security.gentoo.org/glsa/201111-02
reference_id GLSA-201111-02
reference_type
scores
url https://security.gentoo.org/glsa/201111-02
7
reference_url https://security.gentoo.org/glsa/201203-02
reference_id GLSA-201203-02
reference_type
scores
url https://security.gentoo.org/glsa/201203-02
8
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
9
reference_url https://security.gentoo.org/glsa/201406-32
reference_id GLSA-201406-32
reference_type
scores
url https://security.gentoo.org/glsa/201406-32
10
reference_url https://access.redhat.com/errata/RHSA-2011:1380
reference_id RHSA-2011:1380
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1380
11
reference_url https://access.redhat.com/errata/RHSA-2011:1384
reference_id RHSA-2011:1384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1384
12
reference_url https://access.redhat.com/errata/RHSA-2012:0006
reference_id RHSA-2012:0006
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0006
13
reference_url https://access.redhat.com/errata/RHSA-2012:0034
reference_id RHSA-2012:0034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0034
14
reference_url https://access.redhat.com/errata/RHSA-2012:0343
reference_id RHSA-2012:0343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0343
15
reference_url https://access.redhat.com/errata/RHSA-2012:0508
reference_id RHSA-2012:0508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0508
16
reference_url https://access.redhat.com/errata/RHSA-2013:1455
reference_id RHSA-2013:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1455
17
reference_url https://usn.ubuntu.com/1263-1/
reference_id USN-1263-1
reference_type
scores
url https://usn.ubuntu.com/1263-1/
fixed_packages
0
url pkg:deb/debian/curl@7.24.0-1?distro=trixie
purl pkg:deb/debian/curl@7.24.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.24.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2011-3389
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e1yx-dxa6-1bba
76
url VCID-e58m-g37d-9fd6
vulnerability_id VCID-e58m-g37d-9fd6
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8624.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8624
reference_id
reference_type
scores
0
value 0.01346
scoring_system epss
scoring_elements 0.80023
published_at 2026-04-01T12:55:00Z
1
value 0.01346
scoring_system epss
scoring_elements 0.80102
published_at 2026-04-16T12:55:00Z
2
value 0.01346
scoring_system epss
scoring_elements 0.8003
published_at 2026-04-02T12:55:00Z
3
value 0.01346
scoring_system epss
scoring_elements 0.80052
published_at 2026-04-04T12:55:00Z
4
value 0.01346
scoring_system epss
scoring_elements 0.80042
published_at 2026-04-07T12:55:00Z
5
value 0.01346
scoring_system epss
scoring_elements 0.80069
published_at 2026-04-08T12:55:00Z
6
value 0.01346
scoring_system epss
scoring_elements 0.80078
published_at 2026-04-09T12:55:00Z
7
value 0.01346
scoring_system epss
scoring_elements 0.80098
published_at 2026-04-11T12:55:00Z
8
value 0.01346
scoring_system epss
scoring_elements 0.80082
published_at 2026-04-12T12:55:00Z
9
value 0.01346
scoring_system epss
scoring_elements 0.80073
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8624
2
reference_url https://curl.se/docs/CVE-2016-8624.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8624.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388390
reference_id 1388390
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388390
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
20
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
21
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
22
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
23
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
24
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
25
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
26
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
27
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
28
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:deb/debian/curl@7.51.0-1?distro=trixie
purl pkg:deb/debian/curl@7.51.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-8624
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e58m-g37d-9fd6
77
url VCID-eap9-v2gp-fqgh
vulnerability_id VCID-eap9-v2gp-fqgh
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3739.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3739.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3739
reference_id
reference_type
scores
0
value 0.01068
scoring_system epss
scoring_elements 0.77748
published_at 2026-04-16T12:55:00Z
1
value 0.01068
scoring_system epss
scoring_elements 0.77712
published_at 2026-04-12T12:55:00Z
2
value 0.01068
scoring_system epss
scoring_elements 0.77711
published_at 2026-04-13T12:55:00Z
3
value 0.01068
scoring_system epss
scoring_elements 0.77652
published_at 2026-04-01T12:55:00Z
4
value 0.01068
scoring_system epss
scoring_elements 0.77659
published_at 2026-04-02T12:55:00Z
5
value 0.01068
scoring_system epss
scoring_elements 0.77686
published_at 2026-04-04T12:55:00Z
6
value 0.01068
scoring_system epss
scoring_elements 0.77669
published_at 2026-04-07T12:55:00Z
7
value 0.01068
scoring_system epss
scoring_elements 0.77696
published_at 2026-04-08T12:55:00Z
8
value 0.01068
scoring_system epss
scoring_elements 0.77702
published_at 2026-04-09T12:55:00Z
9
value 0.01068
scoring_system epss
scoring_elements 0.77728
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3739
2
reference_url https://curl.haxx.se/changes.html#7_49_0
reference_id
reference_type
scores
url https://curl.haxx.se/changes.html#7_49_0
3
reference_url https://curl.haxx.se/CVE-2016-3739.patch
reference_id
reference_type
scores
url https://curl.haxx.se/CVE-2016-3739.patch
4
reference_url https://curl.haxx.se/docs/adv_20160518.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_20160518.html
5
reference_url https://curl.se/docs/CVE-2016-3739.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-3739.html
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3739
7
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
8
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
9
reference_url http://www.openwall.com/lists/oss-security/2024/03/27/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2024/03/27/4
10
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
11
reference_url http://www.securityfocus.com/bid/90726
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90726
12
reference_url http://www.securitytracker.com/id/1035907
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035907
13
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.495349
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.495349
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1335430
reference_id 1335430
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1335430
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3739
reference_id CVE-2016-3739
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-3739
53
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
fixed_packages
0
url pkg:deb/debian/curl@7.50.1-1?distro=trixie
purl pkg:deb/debian/curl@7.50.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.50.1-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-3739
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eap9-v2gp-fqgh
78
url VCID-eer3-29q8-sbgq
vulnerability_id VCID-eer3-29q8-sbgq
summary security update
references
0
reference_url http://curl.haxx.se/docs/adv_20141105.html
reference_id
reference_type
scores
url http://curl.haxx.se/docs/adv_20141105.html
1
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
2
reference_url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2015-1254.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1254.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3707.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3707.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3707
reference_id
reference_type
scores
0
value 0.00209
scoring_system epss
scoring_elements 0.43397
published_at 2026-04-16T12:55:00Z
1
value 0.00209
scoring_system epss
scoring_elements 0.43337
published_at 2026-04-13T12:55:00Z
2
value 0.00209
scoring_system epss
scoring_elements 0.43274
published_at 2026-04-01T12:55:00Z
3
value 0.00209
scoring_system epss
scoring_elements 0.43331
published_at 2026-04-02T12:55:00Z
4
value 0.00209
scoring_system epss
scoring_elements 0.43359
published_at 2026-04-04T12:55:00Z
5
value 0.00209
scoring_system epss
scoring_elements 0.43296
published_at 2026-04-07T12:55:00Z
6
value 0.00209
scoring_system epss
scoring_elements 0.43348
published_at 2026-04-08T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43363
published_at 2026-04-09T12:55:00Z
8
value 0.00209
scoring_system epss
scoring_elements 0.43384
published_at 2026-04-11T12:55:00Z
9
value 0.00209
scoring_system epss
scoring_elements 0.43352
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3707
7
reference_url https://curl.se/docs/CVE-2014-3707.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2014-3707.html
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707
9
reference_url https://support.apple.com/kb/HT205031
reference_id
reference_type
scores
url https://support.apple.com/kb/HT205031
10
reference_url http://www.debian.org/security/2014/dsa-3069
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3069
11
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
12
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
13
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
14
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
15
reference_url http://www.securityfocus.com/bid/70988
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70988
16
reference_url http://www.ubuntu.com/usn/USN-2399-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2399-1
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1154941
reference_id 1154941
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1154941
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion:11.1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:hyperion:11.1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion:11.1.2.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion:11.1.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:hyperion:11.1.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion:11.1.2.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3707
reference_id CVE-2014-3707
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-3707
76
reference_url https://access.redhat.com/errata/RHSA-2015:1254
reference_id RHSA-2015:1254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1254
77
reference_url https://access.redhat.com/errata/RHSA-2015:2159
reference_id RHSA-2015:2159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2159
78
reference_url https://usn.ubuntu.com/2399-1/
reference_id USN-2399-1
reference_type
scores
url https://usn.ubuntu.com/2399-1/
fixed_packages
0
url pkg:deb/debian/curl@7.38.0-3?distro=trixie
purl pkg:deb/debian/curl@7.38.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.38.0-3%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2014-3707
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eer3-29q8-sbgq
79
url VCID-ej47-4dcu-5fhy
vulnerability_id VCID-ej47-4dcu-5fhy
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42915.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42915.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42915
reference_id
reference_type
scores
0
value 0.00467
scoring_system epss
scoring_elements 0.64442
published_at 2026-04-16T12:55:00Z
1
value 0.00467
scoring_system epss
scoring_elements 0.64436
published_at 2026-04-12T12:55:00Z
2
value 0.00467
scoring_system epss
scoring_elements 0.64407
published_at 2026-04-13T12:55:00Z
3
value 0.00625
scoring_system epss
scoring_elements 0.70143
published_at 2026-04-04T12:55:00Z
4
value 0.00625
scoring_system epss
scoring_elements 0.70128
published_at 2026-04-02T12:55:00Z
5
value 0.00812
scoring_system epss
scoring_elements 0.74272
published_at 2026-04-11T12:55:00Z
6
value 0.00812
scoring_system epss
scoring_elements 0.7425
published_at 2026-04-09T12:55:00Z
7
value 0.00812
scoring_system epss
scoring_elements 0.74235
published_at 2026-04-08T12:55:00Z
8
value 0.00812
scoring_system epss
scoring_elements 0.74203
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42915
2
reference_url https://curl.se/docs/CVE-2022-42915.html
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Medium
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/
url https://curl.se/docs/CVE-2022-42915.html
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://hackerone.com/reports/1722065
reference_id
reference_type
scores
url https://hackerone.com/reports/1722065
5
reference_url http://seclists.org/fulldisclosure/2023/Jan/19
reference_id 19
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/
url http://seclists.org/fulldisclosure/2023/Jan/19
6
reference_url http://seclists.org/fulldisclosure/2023/Jan/20
reference_id 20
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/
url http://seclists.org/fulldisclosure/2023/Jan/20
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2135413
reference_id 2135413
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2135413
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/
reference_id 37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/
9
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/
url https://security.gentoo.org/glsa/202212-01
10
reference_url https://support.apple.com/kb/HT213604
reference_id HT213604
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/
url https://support.apple.com/kb/HT213604
11
reference_url https://support.apple.com/kb/HT213605
reference_id HT213605
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/
url https://support.apple.com/kb/HT213605
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/
reference_id HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/
13
reference_url https://security.netapp.com/advisory/ntap-20221209-0010/
reference_id ntap-20221209-0010
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/
url https://security.netapp.com/advisory/ntap-20221209-0010/
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/
reference_id Q27V5YYMXUVI6PRZQVECON32XPVWTKDK
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/
15
reference_url https://access.redhat.com/errata/RHSA-2022:8840
reference_id RHSA-2022:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8840
16
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
17
reference_url https://usn.ubuntu.com/5702-1/
reference_id USN-5702-1
reference_type
scores
url https://usn.ubuntu.com/5702-1/
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.86.0-1?distro=trixie
purl pkg:deb/debian/curl@7.86.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.86.0-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2022-42915
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ej47-4dcu-5fhy
80
url VCID-ekav-zg3k-v3ea
vulnerability_id VCID-ekav-zg3k-v3ea
summary curl: cookies accepted for TLDs
references
0
reference_url http://curl.haxx.se/docs/adv_20140910B.html
reference_id
reference_type
scores
url http://curl.haxx.se/docs/adv_20140910B.html
1
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
2
reference_url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3620.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3620.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3620
reference_id
reference_type
scores
0
value 0.01306
scoring_system epss
scoring_elements 0.79796
published_at 2026-04-16T12:55:00Z
1
value 0.01306
scoring_system epss
scoring_elements 0.79769
published_at 2026-04-13T12:55:00Z
2
value 0.01306
scoring_system epss
scoring_elements 0.7972
published_at 2026-04-01T12:55:00Z
3
value 0.01306
scoring_system epss
scoring_elements 0.79728
published_at 2026-04-02T12:55:00Z
4
value 0.01306
scoring_system epss
scoring_elements 0.79749
published_at 2026-04-04T12:55:00Z
5
value 0.01306
scoring_system epss
scoring_elements 0.79735
published_at 2026-04-07T12:55:00Z
6
value 0.01306
scoring_system epss
scoring_elements 0.79764
published_at 2026-04-08T12:55:00Z
7
value 0.01306
scoring_system epss
scoring_elements 0.7977
published_at 2026-04-09T12:55:00Z
8
value 0.01306
scoring_system epss
scoring_elements 0.79792
published_at 2026-04-11T12:55:00Z
9
value 0.01306
scoring_system epss
scoring_elements 0.79776
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3620
6
reference_url https://curl.se/docs/CVE-2014-3620.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2014-3620.html
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3620
8
reference_url https://support.apple.com/kb/HT205031
reference_id
reference_type
scores
url https://support.apple.com/kb/HT205031
9
reference_url http://www.debian.org/security/2014/dsa-3022
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3022
10
reference_url http://www.openwall.com/lists/oss-security/2022/05/11/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2022/05/11/2
11
reference_url http://www.securityfocus.com/bid/69742
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69742
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1138846
reference_id 1138846
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1138846
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3620
reference_id CVE-2014-3620
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-3620
31
reference_url https://usn.ubuntu.com/2346-1/
reference_id USN-2346-1
reference_type
scores
url https://usn.ubuntu.com/2346-1/
fixed_packages
0
url pkg:deb/debian/curl@7.38.0-1?distro=trixie
purl pkg:deb/debian/curl@7.38.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.38.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2014-3620
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ekav-zg3k-v3ea
81
url VCID-etzn-uhck-h7b2
vulnerability_id VCID-etzn-uhck-h7b2
summary curl: curl: Information disclosure via OAuth2 bearer token leakage during HTTP(S) redirect
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3783.json
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3783.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-3783
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.035
published_at 2026-04-11T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03509
published_at 2026-04-04T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03544
published_at 2026-04-09T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03521
published_at 2026-04-08T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.0352
published_at 2026-04-07T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03496
published_at 2026-04-02T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04144
published_at 2026-04-16T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.042
published_at 2026-04-12T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04175
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-3783
2
reference_url https://curl.se/docs/CVE-2026-3783.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Medium
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:25:28Z/
url https://curl.se/docs/CVE-2026-3783.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3783
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/3583983
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:25:28Z/
url https://hackerone.com/reports/3583983
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2446450
reference_id 2446450
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2446450
7
reference_url https://curl.se/docs/CVE-2026-3783.json
reference_id CVE-2026-3783.json
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:25:28Z/
url https://curl.se/docs/CVE-2026-3783.json
8
reference_url https://usn.ubuntu.com/8084-1/
reference_id USN-8084-1
reference_type
scores
url https://usn.ubuntu.com/8084-1/
9
reference_url https://usn.ubuntu.com/8099-1/
reference_id USN-8099-1
reference_type
scores
url https://usn.ubuntu.com/8099-1/
fixed_packages
0
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2026-3783
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-etzn-uhck-h7b2
82
url VCID-exhe-cmqf-duad
vulnerability_id VCID-exhe-cmqf-duad
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which might allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2192.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2192.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2192
reference_id
reference_type
scores
0
value 0.02049
scoring_system epss
scoring_elements 0.83894
published_at 2026-04-16T12:55:00Z
1
value 0.02049
scoring_system epss
scoring_elements 0.83795
published_at 2026-04-01T12:55:00Z
2
value 0.02049
scoring_system epss
scoring_elements 0.83808
published_at 2026-04-02T12:55:00Z
3
value 0.02049
scoring_system epss
scoring_elements 0.83823
published_at 2026-04-04T12:55:00Z
4
value 0.02049
scoring_system epss
scoring_elements 0.83825
published_at 2026-04-07T12:55:00Z
5
value 0.02049
scoring_system epss
scoring_elements 0.83849
published_at 2026-04-08T12:55:00Z
6
value 0.02049
scoring_system epss
scoring_elements 0.83855
published_at 2026-04-09T12:55:00Z
7
value 0.02049
scoring_system epss
scoring_elements 0.83872
published_at 2026-04-11T12:55:00Z
8
value 0.02049
scoring_system epss
scoring_elements 0.83866
published_at 2026-04-12T12:55:00Z
9
value 0.02049
scoring_system epss
scoring_elements 0.83861
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2192
2
reference_url https://curl.se/docs/CVE-2011-2192.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2011-2192.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2192
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=631615
reference_id 631615
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=631615
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=711454
reference_id 711454
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=711454
6
reference_url https://security.gentoo.org/glsa/201203-02
reference_id GLSA-201203-02
reference_type
scores
url https://security.gentoo.org/glsa/201203-02
7
reference_url https://access.redhat.com/errata/RHSA-2011:0918
reference_id RHSA-2011:0918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0918
8
reference_url https://usn.ubuntu.com/1158-1/
reference_id USN-1158-1
reference_type
scores
url https://usn.ubuntu.com/1158-1/
fixed_packages
0
url pkg:deb/debian/curl@7.21.6-2?distro=trixie
purl pkg:deb/debian/curl@7.21.6-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.21.6-2%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2011-2192
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-exhe-cmqf-duad
83
url VCID-f1aq-3cj8-gfbq
vulnerability_id VCID-f1aq-3cj8-gfbq
summary curl 7.x before 7.10.7 sends CONNECT proxy credentials to the remote server.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-1605
reference_id
reference_type
scores
0
value 0.00379
scoring_system epss
scoring_elements 0.59453
published_at 2026-04-16T12:55:00Z
1
value 0.00379
scoring_system epss
scoring_elements 0.59421
published_at 2026-04-13T12:55:00Z
2
value 0.00379
scoring_system epss
scoring_elements 0.59308
published_at 2026-04-01T12:55:00Z
3
value 0.00379
scoring_system epss
scoring_elements 0.59382
published_at 2026-04-02T12:55:00Z
4
value 0.00379
scoring_system epss
scoring_elements 0.59406
published_at 2026-04-04T12:55:00Z
5
value 0.00379
scoring_system epss
scoring_elements 0.59372
published_at 2026-04-07T12:55:00Z
6
value 0.00379
scoring_system epss
scoring_elements 0.59423
published_at 2026-04-08T12:55:00Z
7
value 0.00379
scoring_system epss
scoring_elements 0.59437
published_at 2026-04-09T12:55:00Z
8
value 0.00379
scoring_system epss
scoring_elements 0.59455
published_at 2026-04-11T12:55:00Z
9
value 0.00379
scoring_system epss
scoring_elements 0.59439
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-1605
1
reference_url https://curl.se/docs/CVE-2003-1605.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2003-1605.html
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1605
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/curl@7.10.7-1?distro=trixie
purl pkg:deb/debian/curl@7.10.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.10.7-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2003-1605
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f1aq-3cj8-gfbq
84
url VCID-fnj3-2du1-4bhx
vulnerability_id VCID-fnj3-2du1-4bhx
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3558
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9586.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9586.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9586
reference_id
reference_type
scores
0
value 0.00891
scoring_system epss
scoring_elements 0.75492
published_at 2026-04-01T12:55:00Z
1
value 0.00891
scoring_system epss
scoring_elements 0.7559
published_at 2026-04-16T12:55:00Z
2
value 0.00891
scoring_system epss
scoring_elements 0.75494
published_at 2026-04-02T12:55:00Z
3
value 0.00891
scoring_system epss
scoring_elements 0.75525
published_at 2026-04-04T12:55:00Z
4
value 0.00891
scoring_system epss
scoring_elements 0.75506
published_at 2026-04-07T12:55:00Z
5
value 0.00891
scoring_system epss
scoring_elements 0.75548
published_at 2026-04-13T12:55:00Z
6
value 0.00891
scoring_system epss
scoring_elements 0.75557
published_at 2026-04-12T12:55:00Z
7
value 0.00891
scoring_system epss
scoring_elements 0.75578
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9586
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586
4
reference_url https://curl.haxx.se/docs/adv_20161221A.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_20161221A.html
5
reference_url https://curl.se/docs/CVE-2016-9586.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-9586.html
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16
reference_id
reference_type
scores
url https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16
9
reference_url https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
11
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html
12
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
13
reference_url http://www.securityfocus.com/bid/95019
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95019
14
reference_url http://www.securitytracker.com/id/1037515
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1037515
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1406712
reference_id 1406712
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1406712
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848958
reference_id 848958
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848958
17
reference_url https://security.archlinux.org/ASA-201612-22
reference_id ASA-201612-22
reference_type
scores
url https://security.archlinux.org/ASA-201612-22
18
reference_url https://security.archlinux.org/ASA-201701-10
reference_id ASA-201701-10
reference_type
scores
url https://security.archlinux.org/ASA-201701-10
19
reference_url https://security.archlinux.org/ASA-201701-11
reference_id ASA-201701-11
reference_type
scores
url https://security.archlinux.org/ASA-201701-11
20
reference_url https://security.archlinux.org/ASA-201701-7
reference_id ASA-201701-7
reference_type
scores
url https://security.archlinux.org/ASA-201701-7
21
reference_url https://security.archlinux.org/ASA-201701-8
reference_id ASA-201701-8
reference_type
scores
url https://security.archlinux.org/ASA-201701-8
22
reference_url https://security.archlinux.org/ASA-201701-9
reference_id ASA-201701-9
reference_type
scores
url https://security.archlinux.org/ASA-201701-9
23
reference_url https://security.archlinux.org/AVG-112
reference_id AVG-112
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-112
24
reference_url https://security.archlinux.org/AVG-113
reference_id AVG-113
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-113
25
reference_url https://security.archlinux.org/AVG-114
reference_id AVG-114
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-114
26
reference_url https://security.archlinux.org/AVG-115
reference_id AVG-115
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-115
27
reference_url https://security.archlinux.org/AVG-116
reference_id AVG-116
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-116
28
reference_url https://security.archlinux.org/AVG-117
reference_id AVG-117
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-117
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-9586
reference_id CVE-2016-9586
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-9586
31
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
32
reference_url https://usn.ubuntu.com/3441-1/
reference_id USN-3441-1
reference_type
scores
url https://usn.ubuntu.com/3441-1/
33
reference_url https://usn.ubuntu.com/3441-2/
reference_id USN-3441-2
reference_type
scores
url https://usn.ubuntu.com/3441-2/
fixed_packages
0
url pkg:deb/debian/curl@7.52.1-1?distro=trixie
purl pkg:deb/debian/curl@7.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.52.1-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-9586
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fnj3-2du1-4bhx
85
url VCID-fnr7-xb26-dbez
vulnerability_id VCID-fnr7-xb26-dbez
summary Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via a large value as the retry delay. NOTE: many parties report that this has no direct security impact on the curl user; however, it may (in theory) cause a denial of service to associated systems or networks if, for example, --retry-delay is misinterpreted as a value much smaller than what was intended. This is not especially plausible because the overflow only happens if the user was trying to specify that curl should wait weeks (or longer) before trying to recover from a transient error.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-19909
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04279
published_at 2026-04-16T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04329
published_at 2026-04-12T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04307
published_at 2026-04-13T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04228
published_at 2026-04-01T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04269
published_at 2026-04-02T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.0429
published_at 2026-04-04T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04302
published_at 2026-04-07T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04334
published_at 2026-04-08T12:55:00Z
8
value 0.00017
scoring_system epss
scoring_elements 0.04349
published_at 2026-04-09T12:55:00Z
9
value 0.00017
scoring_system epss
scoring_elements 0.04343
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-19909
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19909
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/curl/curl/pull/4166
reference_id 4166
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T18:11:17Z/
url https://github.com/curl/curl/pull/4166
4
reference_url https://daniel.haxx.se/blog/2023/08/26/cve-2020-19909-is-everything-that-is-wrong-with-cves/
reference_id cve-2020-19909-is-everything-that-is-wrong-with-cves
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T18:11:17Z/
url https://daniel.haxx.se/blog/2023/08/26/cve-2020-19909-is-everything-that-is-wrong-with-cves/
fixed_packages
0
url pkg:deb/debian/curl@7.66.0-1?distro=trixie
purl pkg:deb/debian/curl@7.66.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.66.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2020-19909
risk_score 0.8
exploitability 0.5
weighted_severity 1.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fnr7-xb26-dbez
86
url VCID-fp65-97n1-xuaj
vulnerability_id VCID-fp65-97n1-xuaj
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may allow attackers to bypass intended restrictions.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3558
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000100.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000100.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000100
reference_id
reference_type
scores
0
value 0.00962
scoring_system epss
scoring_elements 0.76442
published_at 2026-04-01T12:55:00Z
1
value 0.00962
scoring_system epss
scoring_elements 0.7654
published_at 2026-04-16T12:55:00Z
2
value 0.00962
scoring_system epss
scoring_elements 0.76447
published_at 2026-04-02T12:55:00Z
3
value 0.00962
scoring_system epss
scoring_elements 0.76475
published_at 2026-04-04T12:55:00Z
4
value 0.00962
scoring_system epss
scoring_elements 0.76457
published_at 2026-04-07T12:55:00Z
5
value 0.00962
scoring_system epss
scoring_elements 0.76489
published_at 2026-04-08T12:55:00Z
6
value 0.00962
scoring_system epss
scoring_elements 0.76501
published_at 2026-04-09T12:55:00Z
7
value 0.00962
scoring_system epss
scoring_elements 0.76527
published_at 2026-04-11T12:55:00Z
8
value 0.00962
scoring_system epss
scoring_elements 0.76506
published_at 2026-04-12T12:55:00Z
9
value 0.00962
scoring_system epss
scoring_elements 0.765
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000100
3
reference_url https://curl.haxx.se/docs/adv_20170809B.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_20170809B.html
4
reference_url https://curl.se/docs/CVE-2017-1000100.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2017-1000100.html
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.5
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:P/I:N/A:N
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://support.apple.com/HT208221
reference_id
reference_type
scores
url https://support.apple.com/HT208221
10
reference_url http://www.debian.org/security/2017/dsa-3992
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3992
11
reference_url http://www.securityfocus.com/bid/100286
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100286
12
reference_url http://www.securitytracker.com/id/1039118
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039118
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1478310
reference_id 1478310
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1478310
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871555
reference_id 871555
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871555
15
reference_url https://security.archlinux.org/ASA-201708-16
reference_id ASA-201708-16
reference_type
scores
url https://security.archlinux.org/ASA-201708-16
16
reference_url https://security.archlinux.org/ASA-201710-3
reference_id ASA-201710-3
reference_type
scores
url https://security.archlinux.org/ASA-201710-3
17
reference_url https://security.archlinux.org/ASA-201710-4
reference_id ASA-201710-4
reference_type
scores
url https://security.archlinux.org/ASA-201710-4
18
reference_url https://security.archlinux.org/ASA-201710-5
reference_id ASA-201710-5
reference_type
scores
url https://security.archlinux.org/ASA-201710-5
19
reference_url https://security.archlinux.org/ASA-201710-6
reference_id ASA-201710-6
reference_type
scores
url https://security.archlinux.org/ASA-201710-6
20
reference_url https://security.archlinux.org/ASA-201710-7
reference_id ASA-201710-7
reference_type
scores
url https://security.archlinux.org/ASA-201710-7
21
reference_url https://security.archlinux.org/AVG-370
reference_id AVG-370
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-370
22
reference_url https://security.archlinux.org/AVG-371
reference_id AVG-371
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-371
23
reference_url https://security.archlinux.org/AVG-386
reference_id AVG-386
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-386
24
reference_url https://security.archlinux.org/AVG-387
reference_id AVG-387
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-387
25
reference_url https://security.archlinux.org/AVG-388
reference_id AVG-388
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-388
26
reference_url https://security.archlinux.org/AVG-389
reference_id AVG-389
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-389
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000100
reference_id CVE-2017-1000100
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000100
107
reference_url https://security.gentoo.org/glsa/201709-14
reference_id GLSA-201709-14
reference_type
scores
url https://security.gentoo.org/glsa/201709-14
108
reference_url https://usn.ubuntu.com/3441-1/
reference_id USN-3441-1
reference_type
scores
url https://usn.ubuntu.com/3441-1/
109
reference_url https://usn.ubuntu.com/3441-2/
reference_id USN-3441-2
reference_type
scores
url https://usn.ubuntu.com/3441-2/
fixed_packages
0
url pkg:deb/debian/curl@7.55.0-1?distro=trixie
purl pkg:deb/debian/curl@7.55.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.55.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2017-1000100
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fp65-97n1-xuaj
87
url VCID-frgg-29yv-dyf7
vulnerability_id VCID-frgg-29yv-dyf7
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22890.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22890.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22890
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.25887
published_at 2026-04-01T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.258
published_at 2026-04-16T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.25952
published_at 2026-04-02T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25993
published_at 2026-04-04T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25764
published_at 2026-04-07T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25834
published_at 2026-04-08T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25885
published_at 2026-04-09T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25897
published_at 2026-04-11T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25854
published_at 2026-04-12T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.25797
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22890
2
reference_url https://curl.se/docs/CVE-2021-22890.html
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:11:48Z/
url https://curl.se/docs/CVE-2021-22890.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://hackerone.com/reports/1129529
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:11:48Z/
url https://hackerone.com/reports/1129529
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1941965
reference_id 1941965
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1941965
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
reference_id 2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:11:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986270
reference_id 986270
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986270
16
reference_url https://security.archlinux.org/AVG-1753
reference_id AVG-1753
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1753
17
reference_url https://security.archlinux.org/AVG-1754
reference_id AVG-1754
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1754
18
reference_url https://security.archlinux.org/AVG-1755
reference_id AVG-1755
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1755
19
reference_url https://security.archlinux.org/AVG-1756
reference_id AVG-1756
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1756
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-22890
reference_id CVE-2021-22890
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-22890
21
reference_url https://security.gentoo.org/glsa/202105-36
reference_id GLSA-202105-36
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:11:48Z/
url https://security.gentoo.org/glsa/202105-36
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
reference_id ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:11:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
reference_id KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:11:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
24
reference_url https://security.netapp.com/advisory/ntap-20210521-0007/
reference_id ntap-20210521-0007
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:11:48Z/
url https://security.netapp.com/advisory/ntap-20210521-0007/
25
reference_url https://access.redhat.com/errata/RHSA-2021:2471
reference_id RHSA-2021:2471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2471
26
reference_url https://access.redhat.com/errata/RHSA-2021:2472
reference_id RHSA-2021:2472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2472
27
reference_url https://usn.ubuntu.com/4898-1/
reference_id USN-4898-1
reference_type
scores
url https://usn.ubuntu.com/4898-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.2?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.2%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2021-22890
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-frgg-29yv-dyf7
88
url VCID-ggt7-eejg-xfb6
vulnerability_id VCID-ggt7-eejg-xfb6
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22876.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22876.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22876
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20928
published_at 2026-04-01T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.20845
published_at 2026-04-07T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.20987
published_at 2026-04-09T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20925
published_at 2026-04-08T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.21131
published_at 2026-04-04T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.21078
published_at 2026-04-02T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.21003
published_at 2026-04-11T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.30169
published_at 2026-04-16T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.30153
published_at 2026-04-13T12:55:00Z
9
value 0.00115
scoring_system epss
scoring_elements 0.30201
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22876
2
reference_url https://curl.se/docs/CVE-2021-22876.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://curl.se/docs/CVE-2021-22876.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://hackerone.com/reports/1101882
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://hackerone.com/reports/1101882
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1941964
reference_id 1941964
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1941964
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
reference_id 2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
15
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986269
reference_id 986269
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986269
16
reference_url https://security.archlinux.org/AVG-1753
reference_id AVG-1753
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1753
17
reference_url https://security.archlinux.org/AVG-1754
reference_id AVG-1754
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1754
18
reference_url https://security.archlinux.org/AVG-1755
reference_id AVG-1755
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1755
19
reference_url https://security.archlinux.org/AVG-1756
reference_id AVG-1756
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1756
20
reference_url https://security.archlinux.org/AVG-1757
reference_id AVG-1757
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1757
21
reference_url https://security.archlinux.org/AVG-1758
reference_id AVG-1758
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1758
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-22876
reference_id CVE-2021-22876
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-22876
23
reference_url https://security.gentoo.org/glsa/202105-36
reference_id GLSA-202105-36
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://security.gentoo.org/glsa/202105-36
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
reference_id ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
reference_id KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
26
reference_url https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html
27
reference_url https://security.netapp.com/advisory/ntap-20210521-0007/
reference_id ntap-20210521-0007
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/
url https://security.netapp.com/advisory/ntap-20210521-0007/
28
reference_url https://access.redhat.com/errata/RHSA-2021:2471
reference_id RHSA-2021:2471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2471
29
reference_url https://access.redhat.com/errata/RHSA-2021:2472
reference_id RHSA-2021:2472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2472
30
reference_url https://access.redhat.com/errata/RHSA-2021:4511
reference_id RHSA-2021:4511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4511
31
reference_url https://access.redhat.com/errata/RHSA-2022:1354
reference_id RHSA-2022:1354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1354
32
reference_url https://usn.ubuntu.com/4898-1/
reference_id USN-4898-1
reference_type
scores
url https://usn.ubuntu.com/4898-1/
33
reference_url https://usn.ubuntu.com/4903-1/
reference_id USN-4903-1
reference_type
scores
url https://usn.ubuntu.com/4903-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.2?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.2%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2021-22876
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ggt7-eejg-xfb6
89
url VCID-gnx2-djyk-uyaf
vulnerability_id VCID-gnx2-djyk-uyaf
summary
Cookie injection with none file
This flaw allows an attacker to insert cookies at will into a running program
using libcurl, if the specific series of conditions are met.

libcurl performs transfers. In its API, an application creates "easy handles"
that are the individual handles for single transfers.

libcurl provides a function call that duplicates en easy handle called
[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).

If a transfer has cookies enabled when the handle is duplicated, the
cookie-enable state is also cloned - but without cloning the actual
cookies. If the source handle does not read any cookies from a specific file on
disk, the cloned version of the handle would instead store the file name as
`none` (using the four ASCII letters, no quotes).

Subsequent use of the cloned handle that does not explicitly set a source to
load cookies from would then inadvertently load cookies from a file named
`none` - if such a file exists and is readable in the current directory of the
program using libcurl. And if using the correct file format of course.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38546.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38546.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38546
reference_id
reference_type
scores
0
value 0.00256
scoring_system epss
scoring_elements 0.49036
published_at 2026-04-16T12:55:00Z
1
value 0.00256
scoring_system epss
scoring_elements 0.48964
published_at 2026-04-02T12:55:00Z
2
value 0.00256
scoring_system epss
scoring_elements 0.48991
published_at 2026-04-13T12:55:00Z
3
value 0.00256
scoring_system epss
scoring_elements 0.48944
published_at 2026-04-07T12:55:00Z
4
value 0.00256
scoring_system epss
scoring_elements 0.48998
published_at 2026-04-08T12:55:00Z
5
value 0.00256
scoring_system epss
scoring_elements 0.48995
published_at 2026-04-09T12:55:00Z
6
value 0.00256
scoring_system epss
scoring_elements 0.49012
published_at 2026-04-11T12:55:00Z
7
value 0.00256
scoring_system epss
scoring_elements 0.48985
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38546
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/2148242
reference_id
reference_type
scores
url https://hackerone.com/reports/2148242
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241938
reference_id 2241938
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241938
7
reference_url http://seclists.org/fulldisclosure/2024/Jan/34
reference_id 34
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url http://seclists.org/fulldisclosure/2024/Jan/34
8
reference_url http://seclists.org/fulldisclosure/2024/Jan/37
reference_id 37
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url http://seclists.org/fulldisclosure/2024/Jan/37
9
reference_url http://seclists.org/fulldisclosure/2024/Jan/38
reference_id 38
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url http://seclists.org/fulldisclosure/2024/Jan/38
10
reference_url https://security.archlinux.org/AVG-2845
reference_id AVG-2845
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2845
11
reference_url https://security.archlinux.org/AVG-2846
reference_id AVG-2846
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2846
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-38546
reference_id CVE-2023-38546
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-38546
13
reference_url https://curl.se/docs/CVE-2023-38546.html
reference_id CVE-2023-38546.HTML
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url https://curl.se/docs/CVE-2023-38546.html
14
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
url https://security.gentoo.org/glsa/202310-12
15
reference_url https://support.apple.com/kb/HT214036
reference_id HT214036
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url https://support.apple.com/kb/HT214036
16
reference_url https://support.apple.com/kb/HT214057
reference_id HT214057
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url https://support.apple.com/kb/HT214057
17
reference_url https://support.apple.com/kb/HT214058
reference_id HT214058
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url https://support.apple.com/kb/HT214058
18
reference_url https://support.apple.com/kb/HT214063
reference_id HT214063
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url https://support.apple.com/kb/HT214063
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/
reference_id OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/
20
reference_url https://access.redhat.com/errata/RHSA-2023:5700
reference_id RHSA-2023:5700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5700
21
reference_url https://access.redhat.com/errata/RHSA-2023:5763
reference_id RHSA-2023:5763
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5763
22
reference_url https://access.redhat.com/errata/RHSA-2023:6292
reference_id RHSA-2023:6292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6292
23
reference_url https://access.redhat.com/errata/RHSA-2023:6745
reference_id RHSA-2023:6745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6745
24
reference_url https://access.redhat.com/errata/RHSA-2023:7540
reference_id RHSA-2023:7540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7540
25
reference_url https://access.redhat.com/errata/RHSA-2023:7625
reference_id RHSA-2023:7625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7625
26
reference_url https://access.redhat.com/errata/RHSA-2023:7626
reference_id RHSA-2023:7626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7626
27
reference_url https://access.redhat.com/errata/RHSA-2024:1601
reference_id RHSA-2024:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1601
28
reference_url https://access.redhat.com/errata/RHSA-2024:2092
reference_id RHSA-2024:2092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2092
29
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
30
reference_url https://access.redhat.com/errata/RHSA-2024:2101
reference_id RHSA-2024:2101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2101
31
reference_url https://usn.ubuntu.com/6429-1/
reference_id USN-6429-1
reference_type
scores
url https://usn.ubuntu.com/6429-1/
32
reference_url https://usn.ubuntu.com/6429-2/
reference_id USN-6429-2
reference_type
scores
url https://usn.ubuntu.com/6429-2/
33
reference_url https://usn.ubuntu.com/6429-3/
reference_id USN-6429-3
reference_type
scores
url https://usn.ubuntu.com/6429-3/
34
reference_url https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868
reference_id viewtopic.php?f=8&t=8868
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/
url https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u10?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u10%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.3.0-3?distro=trixie
purl pkg:deb/debian/curl@8.3.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.3.0-3%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
7
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2023-38546
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gnx2-djyk-uyaf
90
url VCID-gv7x-j8bz-wycc
vulnerability_id VCID-gv7x-j8bz-wycc
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32207.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32207.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32207
reference_id
reference_type
scores
0
value 0.00204
scoring_system epss
scoring_elements 0.42654
published_at 2026-04-16T12:55:00Z
1
value 0.00204
scoring_system epss
scoring_elements 0.42604
published_at 2026-04-02T12:55:00Z
2
value 0.00204
scoring_system epss
scoring_elements 0.42633
published_at 2026-04-04T12:55:00Z
3
value 0.00204
scoring_system epss
scoring_elements 0.42572
published_at 2026-04-07T12:55:00Z
4
value 0.00204
scoring_system epss
scoring_elements 0.42624
published_at 2026-04-08T12:55:00Z
5
value 0.00204
scoring_system epss
scoring_elements 0.42635
published_at 2026-04-09T12:55:00Z
6
value 0.00204
scoring_system epss
scoring_elements 0.42658
published_at 2026-04-11T12:55:00Z
7
value 0.00204
scoring_system epss
scoring_elements 0.42622
published_at 2026-04-12T12:55:00Z
8
value 0.00204
scoring_system epss
scoring_elements 0.42594
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32207
2
reference_url https://curl.se/docs/CVE-2022-32207.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-32207.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1573634
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/
url https://hackerone.com/reports/1573634
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2099305
reference_id 2099305
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2099305
21
reference_url http://seclists.org/fulldisclosure/2022/Oct/28
reference_id 28
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/
url http://seclists.org/fulldisclosure/2022/Oct/28
22
reference_url http://seclists.org/fulldisclosure/2022/Oct/41
reference_id 41
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/
url http://seclists.org/fulldisclosure/2022/Oct/41
23
reference_url https://security.archlinux.org/AVG-2817
reference_id AVG-2817
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2817
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
reference_id BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
25
reference_url https://www.debian.org/security/2022/dsa-5197
reference_id dsa-5197
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/
url https://www.debian.org/security/2022/dsa-5197
26
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/
url https://security.gentoo.org/glsa/202212-01
27
reference_url https://support.apple.com/kb/HT213488
reference_id HT213488
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/
url https://support.apple.com/kb/HT213488
28
reference_url https://security.netapp.com/advisory/ntap-20220915-0003/
reference_id ntap-20220915-0003
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/
url https://security.netapp.com/advisory/ntap-20220915-0003/
29
reference_url https://access.redhat.com/errata/RHSA-2022:6157
reference_id RHSA-2022:6157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6157
30
reference_url https://access.redhat.com/errata/RHSA-2022:8840
reference_id RHSA-2022:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8840
31
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
32
reference_url https://usn.ubuntu.com/5495-1/
reference_id USN-5495-1
reference_type
scores
url https://usn.ubuntu.com/5495-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.84.0-1?distro=trixie
purl pkg:deb/debian/curl@7.84.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.84.0-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2022-32207
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gv7x-j8bz-wycc
91
url VCID-gwb6-rf4r-d3b2
vulnerability_id VCID-gwb6-rf4r-d3b2
summary
Multiple vulnerabilities have been found in cURL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url http://blog.volema.com/curl-rce.html
reference_id
reference_type
scores
url http://blog.volema.com/curl-rce.html
1
reference_url http://curl.haxx.se/docs/adv_20130206.html
reference_id
reference_type
scores
url http://curl.haxx.se/docs/adv_20130206.html
2
reference_url http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099140.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099140.html
4
reference_url http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/
reference_id
reference_type
scores
url http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/
5
reference_url http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html
6
reference_url http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0249.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0249.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0249
reference_id
reference_type
scores
0
value 0.44202
scoring_system epss
scoring_elements 0.97557
published_at 2026-04-16T12:55:00Z
1
value 0.44202
scoring_system epss
scoring_elements 0.97549
published_at 2026-04-13T12:55:00Z
2
value 0.44202
scoring_system epss
scoring_elements 0.97526
published_at 2026-04-01T12:55:00Z
3
value 0.44202
scoring_system epss
scoring_elements 0.97531
published_at 2026-04-02T12:55:00Z
4
value 0.44202
scoring_system epss
scoring_elements 0.97534
published_at 2026-04-04T12:55:00Z
5
value 0.44202
scoring_system epss
scoring_elements 0.97536
published_at 2026-04-07T12:55:00Z
6
value 0.44202
scoring_system epss
scoring_elements 0.97541
published_at 2026-04-08T12:55:00Z
7
value 0.44202
scoring_system epss
scoring_elements 0.97543
published_at 2026-04-09T12:55:00Z
8
value 0.44202
scoring_system epss
scoring_elements 0.97546
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0249
9
reference_url https://curl.se/docs/CVE-2013-0249.html
reference_id
reference_type
scores
0
value Critical
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2013-0249.html
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0249
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0249
11
reference_url http://www.exploit-db.com/exploits/24487
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/24487
12
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
13
reference_url http://www.osvdb.org/89988
reference_id
reference_type
scores
url http://www.osvdb.org/89988
14
reference_url http://www.securityfocus.com/bid/57842
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/57842
15
reference_url http://www.securitytracker.com/id/1028093
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1028093
16
reference_url http://www.ubuntu.com/usn/USN-1721-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1721-1
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700002
reference_id 700002
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700002
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=906779
reference_id 906779
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=906779
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0249
reference_id CVE-2013-0249
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2013-0249
29
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/24487.py
reference_id CVE-2013-0249;OSVDB-89988
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/24487.py
30
reference_url https://security.gentoo.org/glsa/201401-14
reference_id GLSA-201401-14
reference_type
scores
url https://security.gentoo.org/glsa/201401-14
31
reference_url https://usn.ubuntu.com/1721-1/
reference_id USN-1721-1
reference_type
scores
url https://usn.ubuntu.com/1721-1/
fixed_packages
0
url pkg:deb/debian/curl@7.29.0-1?distro=trixie
purl pkg:deb/debian/curl@7.29.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.29.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2013-0249
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gwb6-rf4r-d3b2
92
url VCID-hj8v-tgnn-mfdw
vulnerability_id VCID-hj8v-tgnn-mfdw
summary The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, allows remote attackers to obtain sensitive information, cause a denial of service (crash), or possibly have unspecified other impact via a wildcard certificate name, which triggers an out-of-bounds read.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9953
reference_id
reference_type
scores
0
value 0.01854
scoring_system epss
scoring_elements 0.83049
published_at 2026-04-16T12:55:00Z
1
value 0.01854
scoring_system epss
scoring_elements 0.82946
published_at 2026-04-01T12:55:00Z
2
value 0.01854
scoring_system epss
scoring_elements 0.82963
published_at 2026-04-02T12:55:00Z
3
value 0.01854
scoring_system epss
scoring_elements 0.82976
published_at 2026-04-04T12:55:00Z
4
value 0.01854
scoring_system epss
scoring_elements 0.82973
published_at 2026-04-07T12:55:00Z
5
value 0.01854
scoring_system epss
scoring_elements 0.82998
published_at 2026-04-08T12:55:00Z
6
value 0.01854
scoring_system epss
scoring_elements 0.83005
published_at 2026-04-09T12:55:00Z
7
value 0.01854
scoring_system epss
scoring_elements 0.83021
published_at 2026-04-11T12:55:00Z
8
value 0.01854
scoring_system epss
scoring_elements 0.83015
published_at 2026-04-12T12:55:00Z
9
value 0.01854
scoring_system epss
scoring_elements 0.8301
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9953
1
reference_url https://curl.se/docs/CVE-2016-9953.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-9953.html
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-9953
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hj8v-tgnn-mfdw
93
url VCID-hjkx-6yep-mkde
vulnerability_id VCID-hjkx-6yep-mkde
summary curl: removes wrong file on error
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27778.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27778.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27778
reference_id
reference_type
scores
0
value 0.00911
scoring_system epss
scoring_elements 0.75856
published_at 2026-04-16T12:55:00Z
1
value 0.00911
scoring_system epss
scoring_elements 0.75844
published_at 2026-04-11T12:55:00Z
2
value 0.00911
scoring_system epss
scoring_elements 0.75825
published_at 2026-04-12T12:55:00Z
3
value 0.00911
scoring_system epss
scoring_elements 0.75818
published_at 2026-04-13T12:55:00Z
4
value 0.00911
scoring_system epss
scoring_elements 0.75764
published_at 2026-04-02T12:55:00Z
5
value 0.00911
scoring_system epss
scoring_elements 0.75796
published_at 2026-04-04T12:55:00Z
6
value 0.00911
scoring_system epss
scoring_elements 0.75776
published_at 2026-04-07T12:55:00Z
7
value 0.00911
scoring_system epss
scoring_elements 0.75808
published_at 2026-04-08T12:55:00Z
8
value 0.00911
scoring_system epss
scoring_elements 0.7582
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27778
2
reference_url https://curl.se/docs/CVE-2022-27778.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-27778.html
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://hackerone.com/reports/1553598
reference_id
reference_type
scores
url https://hackerone.com/reports/1553598
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082194
reference_id 2082194
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082194
6
reference_url https://security.archlinux.org/AVG-2706
reference_id AVG-2706
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2706
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.83.1-1?distro=trixie
purl pkg:deb/debian/curl@7.83.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.1-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2022-27778
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hjkx-6yep-mkde
94
url VCID-hrsy-694u-2fec
vulnerability_id VCID-hrsy-694u-2fec
summary curl: OCSP stapling bypass with GnuTLS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8096.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8096.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-8096
reference_id
reference_type
scores
0
value 0.00515
scoring_system epss
scoring_elements 0.66629
published_at 2026-04-16T12:55:00Z
1
value 0.00515
scoring_system epss
scoring_elements 0.66562
published_at 2026-04-02T12:55:00Z
2
value 0.00515
scoring_system epss
scoring_elements 0.66587
published_at 2026-04-04T12:55:00Z
3
value 0.00515
scoring_system epss
scoring_elements 0.66559
published_at 2026-04-07T12:55:00Z
4
value 0.00515
scoring_system epss
scoring_elements 0.66606
published_at 2026-04-08T12:55:00Z
5
value 0.00515
scoring_system epss
scoring_elements 0.6662
published_at 2026-04-09T12:55:00Z
6
value 0.00515
scoring_system epss
scoring_elements 0.66638
published_at 2026-04-11T12:55:00Z
7
value 0.00515
scoring_system epss
scoring_elements 0.66626
published_at 2026-04-12T12:55:00Z
8
value 0.00515
scoring_system epss
scoring_elements 0.66593
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-8096
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8096
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2310519
reference_id 2310519
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2310519
5
reference_url https://hackerone.com/reports/2669852
reference_id 2669852
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T13:42:47Z/
url https://hackerone.com/reports/2669852
6
reference_url https://curl.se/docs/CVE-2024-8096.html
reference_id CVE-2024-8096.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Medium
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T13:42:47Z/
url https://curl.se/docs/CVE-2024-8096.html
7
reference_url https://curl.se/docs/CVE-2024-8096.json
reference_id CVE-2024-8096.json
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T13:42:47Z/
url https://curl.se/docs/CVE-2024-8096.json
8
reference_url https://usn.ubuntu.com/7012-1/
reference_id USN-7012-1
reference_type
scores
url https://usn.ubuntu.com/7012-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u14?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u14?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u14%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.10.0-1?distro=trixie
purl pkg:deb/debian/curl@8.10.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.10.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
7
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2024-8096
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hrsy-694u-2fec
95
url VCID-hudt-78dw-tkf2
vulnerability_id VCID-hudt-78dw-tkf2
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22925
reference_id
reference_type
scores
0
value 0.00319
scoring_system epss
scoring_elements 0.5489
published_at 2026-04-01T12:55:00Z
1
value 0.00319
scoring_system epss
scoring_elements 0.55017
published_at 2026-04-11T12:55:00Z
2
value 0.00319
scoring_system epss
scoring_elements 0.55005
published_at 2026-04-09T12:55:00Z
3
value 0.00319
scoring_system epss
scoring_elements 0.55006
published_at 2026-04-08T12:55:00Z
4
value 0.00319
scoring_system epss
scoring_elements 0.54956
published_at 2026-04-07T12:55:00Z
5
value 0.00319
scoring_system epss
scoring_elements 0.5496
published_at 2026-04-02T12:55:00Z
6
value 0.00319
scoring_system epss
scoring_elements 0.54986
published_at 2026-04-04T12:55:00Z
7
value 0.00424
scoring_system epss
scoring_elements 0.62217
published_at 2026-04-16T12:55:00Z
8
value 0.00424
scoring_system epss
scoring_elements 0.62194
published_at 2026-04-12T12:55:00Z
9
value 0.00424
scoring_system epss
scoring_elements 0.62173
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22925
2
reference_url https://curl.se/docs/CVE-2021-22925.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22925.html
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://hackerone.com/reports/1223882
reference_id
reference_type
scores
url https://hackerone.com/reports/1223882
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1970902
reference_id 1970902
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1970902
6
reference_url https://security.archlinux.org/ASA-202107-59
reference_id ASA-202107-59
reference_type
scores
url https://security.archlinux.org/ASA-202107-59
7
reference_url https://security.archlinux.org/ASA-202107-60
reference_id ASA-202107-60
reference_type
scores
url https://security.archlinux.org/ASA-202107-60
8
reference_url https://security.archlinux.org/ASA-202107-61
reference_id ASA-202107-61
reference_type
scores
url https://security.archlinux.org/ASA-202107-61
9
reference_url https://security.archlinux.org/ASA-202107-62
reference_id ASA-202107-62
reference_type
scores
url https://security.archlinux.org/ASA-202107-62
10
reference_url https://security.archlinux.org/ASA-202107-63
reference_id ASA-202107-63
reference_type
scores
url https://security.archlinux.org/ASA-202107-63
11
reference_url https://security.archlinux.org/ASA-202107-64
reference_id ASA-202107-64
reference_type
scores
url https://security.archlinux.org/ASA-202107-64
12
reference_url https://security.archlinux.org/AVG-2194
reference_id AVG-2194
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2194
13
reference_url https://security.archlinux.org/AVG-2195
reference_id AVG-2195
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2195
14
reference_url https://security.archlinux.org/AVG-2196
reference_id AVG-2196
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2196
15
reference_url https://security.archlinux.org/AVG-2197
reference_id AVG-2197
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2197
16
reference_url https://security.archlinux.org/AVG-2198
reference_id AVG-2198
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2198
17
reference_url https://security.archlinux.org/AVG-2199
reference_id AVG-2199
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2199
18
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
url https://security.gentoo.org/glsa/202212-01
19
reference_url https://access.redhat.com/errata/RHSA-2021:4511
reference_id RHSA-2021:4511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4511
20
reference_url https://usn.ubuntu.com/5021-1/
reference_id USN-5021-1
reference_type
scores
url https://usn.ubuntu.com/5021-1/
21
reference_url https://usn.ubuntu.com/5021-2/
reference_id USN-5021-2
reference_type
scores
url https://usn.ubuntu.com/5021-2/
22
reference_url https://usn.ubuntu.com/5894-1/
reference_id USN-5894-1
reference_type
scores
url https://usn.ubuntu.com/5894-1/
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2021-22925
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hudt-78dw-tkf2
96
url VCID-hyqp-z8hb-fqbt
vulnerability_id VCID-hyqp-z8hb-fqbt
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9594.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9594.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9594
reference_id
reference_type
scores
0
value 0.01088
scoring_system epss
scoring_elements 0.77857
published_at 2026-04-01T12:55:00Z
1
value 0.01088
scoring_system epss
scoring_elements 0.77954
published_at 2026-04-16T12:55:00Z
2
value 0.01088
scoring_system epss
scoring_elements 0.77864
published_at 2026-04-02T12:55:00Z
3
value 0.01088
scoring_system epss
scoring_elements 0.77892
published_at 2026-04-04T12:55:00Z
4
value 0.01088
scoring_system epss
scoring_elements 0.77874
published_at 2026-04-07T12:55:00Z
5
value 0.01088
scoring_system epss
scoring_elements 0.77901
published_at 2026-04-08T12:55:00Z
6
value 0.01088
scoring_system epss
scoring_elements 0.77906
published_at 2026-04-09T12:55:00Z
7
value 0.01088
scoring_system epss
scoring_elements 0.77933
published_at 2026-04-11T12:55:00Z
8
value 0.01088
scoring_system epss
scoring_elements 0.77917
published_at 2026-04-12T12:55:00Z
9
value 0.01088
scoring_system epss
scoring_elements 0.77916
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9594
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9594
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9594
3
reference_url https://curl.haxx.se/docs/adv_20161223.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_20161223.html
4
reference_url https://curl.se/docs/CVE-2016-9594.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-9594.html
5
reference_url https://www.tenable.com/security/tns-2017-04
reference_id
reference_type
scores
url https://www.tenable.com/security/tns-2017-04
6
reference_url http://www.securityfocus.com/bid/95094
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95094
7
reference_url http://www.securitytracker.com/id/1037528
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1037528
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1408385
reference_id 1408385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1408385
9
reference_url https://security.archlinux.org/ASA-201612-22
reference_id ASA-201612-22
reference_type
scores
url https://security.archlinux.org/ASA-201612-22
10
reference_url https://security.archlinux.org/ASA-201701-10
reference_id ASA-201701-10
reference_type
scores
url https://security.archlinux.org/ASA-201701-10
11
reference_url https://security.archlinux.org/ASA-201701-11
reference_id ASA-201701-11
reference_type
scores
url https://security.archlinux.org/ASA-201701-11
12
reference_url https://security.archlinux.org/ASA-201701-7
reference_id ASA-201701-7
reference_type
scores
url https://security.archlinux.org/ASA-201701-7
13
reference_url https://security.archlinux.org/ASA-201701-8
reference_id ASA-201701-8
reference_type
scores
url https://security.archlinux.org/ASA-201701-8
14
reference_url https://security.archlinux.org/ASA-201701-9
reference_id ASA-201701-9
reference_type
scores
url https://security.archlinux.org/ASA-201701-9
15
reference_url https://security.archlinux.org/AVG-112
reference_id AVG-112
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-112
16
reference_url https://security.archlinux.org/AVG-113
reference_id AVG-113
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-113
17
reference_url https://security.archlinux.org/AVG-114
reference_id AVG-114
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-114
18
reference_url https://security.archlinux.org/AVG-115
reference_id AVG-115
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-115
19
reference_url https://security.archlinux.org/AVG-116
reference_id AVG-116
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-116
20
reference_url https://security.archlinux.org/AVG-117
reference_id AVG-117
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-117
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-9594
reference_id CVE-2016-9594
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
2
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-9594
23
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-9594
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hyqp-z8hb-fqbt
97
url VCID-j2cq-q3r9-jfcp
vulnerability_id VCID-j2cq-q3r9-jfcp
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8620.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8620.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8620
reference_id
reference_type
scores
0
value 0.00816
scoring_system epss
scoring_elements 0.74253
published_at 2026-04-01T12:55:00Z
1
value 0.00816
scoring_system epss
scoring_elements 0.74335
published_at 2026-04-16T12:55:00Z
2
value 0.00816
scoring_system epss
scoring_elements 0.74326
published_at 2026-04-11T12:55:00Z
3
value 0.00816
scoring_system epss
scoring_elements 0.74306
published_at 2026-04-12T12:55:00Z
4
value 0.00816
scoring_system epss
scoring_elements 0.74298
published_at 2026-04-13T12:55:00Z
5
value 0.00816
scoring_system epss
scoring_elements 0.74258
published_at 2026-04-07T12:55:00Z
6
value 0.00816
scoring_system epss
scoring_elements 0.74284
published_at 2026-04-04T12:55:00Z
7
value 0.00816
scoring_system epss
scoring_elements 0.7429
published_at 2026-04-08T12:55:00Z
8
value 0.00816
scoring_system epss
scoring_elements 0.74305
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8620
2
reference_url https://curl.se/docs/CVE-2016-8620.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8620.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388382
reference_id 1388382
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388382
15
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
16
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
17
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
18
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:deb/debian/curl@7.51.0-1?distro=trixie
purl pkg:deb/debian/curl@7.51.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-8620
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j2cq-q3r9-jfcp
98
url VCID-j2qx-np45-4qdu
vulnerability_id VCID-j2qx-np45-4qdu
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:2486
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2486
1
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3558
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000257.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000257.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000257
reference_id
reference_type
scores
0
value 0.00875
scoring_system epss
scoring_elements 0.75327
published_at 2026-04-16T12:55:00Z
1
value 0.01001
scoring_system epss
scoring_elements 0.76996
published_at 2026-04-12T12:55:00Z
2
value 0.01001
scoring_system epss
scoring_elements 0.77017
published_at 2026-04-11T12:55:00Z
3
value 0.01001
scoring_system epss
scoring_elements 0.76991
published_at 2026-04-13T12:55:00Z
4
value 0.0109
scoring_system epss
scoring_elements 0.77876
published_at 2026-04-01T12:55:00Z
5
value 0.01419
scoring_system epss
scoring_elements 0.80553
published_at 2026-04-04T12:55:00Z
6
value 0.01419
scoring_system epss
scoring_elements 0.80545
published_at 2026-04-07T12:55:00Z
7
value 0.01419
scoring_system epss
scoring_elements 0.80531
published_at 2026-04-02T12:55:00Z
8
value 0.01419
scoring_system epss
scoring_elements 0.80584
published_at 2026-04-09T12:55:00Z
9
value 0.01419
scoring_system epss
scoring_elements 0.80574
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000257
4
reference_url https://curl.haxx.se/docs/adv_20171023.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_20171023.html
5
reference_url https://curl.se/docs/CVE-2017-1000257.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2017-1000257.html
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000257
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:P
1
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url http://www.debian.org/security/2017/dsa-4007
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-4007
9
reference_url http://www.securityfocus.com/bid/101519
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101519
10
reference_url http://www.securitytracker.com/id/1039644
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039644
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1503705
reference_id 1503705
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1503705
12
reference_url https://security.archlinux.org/ASA-201711-10
reference_id ASA-201711-10
reference_type
scores
url https://security.archlinux.org/ASA-201711-10
13
reference_url https://security.archlinux.org/ASA-201711-11
reference_id ASA-201711-11
reference_type
scores
url https://security.archlinux.org/ASA-201711-11
14
reference_url https://security.archlinux.org/ASA-201711-6
reference_id ASA-201711-6
reference_type
scores
url https://security.archlinux.org/ASA-201711-6
15
reference_url https://security.archlinux.org/ASA-201711-7
reference_id ASA-201711-7
reference_type
scores
url https://security.archlinux.org/ASA-201711-7
16
reference_url https://security.archlinux.org/ASA-201711-8
reference_id ASA-201711-8
reference_type
scores
url https://security.archlinux.org/ASA-201711-8
17
reference_url https://security.archlinux.org/ASA-201711-9
reference_id ASA-201711-9
reference_type
scores
url https://security.archlinux.org/ASA-201711-9
18
reference_url https://security.archlinux.org/AVG-462
reference_id AVG-462
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-462
19
reference_url https://security.archlinux.org/AVG-463
reference_id AVG-463
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-463
20
reference_url https://security.archlinux.org/AVG-464
reference_id AVG-464
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-464
21
reference_url https://security.archlinux.org/AVG-465
reference_id AVG-465
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-465
22
reference_url https://security.archlinux.org/AVG-466
reference_id AVG-466
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-466
23
reference_url https://security.archlinux.org/AVG-467
reference_id AVG-467
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-467
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000257
reference_id CVE-2017-1000257
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000257
28
reference_url https://security.gentoo.org/glsa/201712-04
reference_id GLSA-201712-04
reference_type
scores
url https://security.gentoo.org/glsa/201712-04
29
reference_url https://access.redhat.com/errata/RHSA-2017:3263
reference_id RHSA-2017:3263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3263
30
reference_url https://usn.ubuntu.com/3441-2/
reference_id USN-3441-2
reference_type
scores
url https://usn.ubuntu.com/3441-2/
31
reference_url https://usn.ubuntu.com/3457-1/
reference_id USN-3457-1
reference_type
scores
url https://usn.ubuntu.com/3457-1/
fixed_packages
0
url pkg:deb/debian/curl@7.56.1-1?distro=trixie
purl pkg:deb/debian/curl@7.56.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.56.1-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2017-1000257
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j2qx-np45-4qdu
99
url VCID-j5s3-rr74-nqb8
vulnerability_id VCID-j5s3-rr74-nqb8
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in information disclosure or data loss.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8169.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8169.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8169
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15732
published_at 2026-04-01T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15576
published_at 2026-04-16T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15743
published_at 2026-04-11T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15708
published_at 2026-04-12T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15643
published_at 2026-04-13T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.1576
published_at 2026-04-02T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15827
published_at 2026-04-04T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.1563
published_at 2026-04-07T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15715
published_at 2026-04-08T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.15774
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8169
2
reference_url https://curl.se/docs/CVE-2020-8169.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2020-8169.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://hackerone.com/reports/874778
reference_id
reference_type
scores
url https://hackerone.com/reports/874778
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1847916
reference_id 1847916
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1847916
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965280
reference_id 965280
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965280
15
reference_url https://security.archlinux.org/AVG-1194
reference_id AVG-1194
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1194
16
reference_url https://security.gentoo.org/glsa/202007-16
reference_id GLSA-202007-16
reference_type
scores
url https://security.gentoo.org/glsa/202007-16
17
reference_url https://access.redhat.com/errata/RHSA-2021:2471
reference_id RHSA-2021:2471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2471
18
reference_url https://access.redhat.com/errata/RHSA-2021:2472
reference_id RHSA-2021:2472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2472
19
reference_url https://usn.ubuntu.com/4402-1/
reference_id USN-4402-1
reference_type
scores
url https://usn.ubuntu.com/4402-1/
fixed_packages
0
url pkg:deb/debian/curl@7.72.0-1?distro=trixie
purl pkg:deb/debian/curl@7.72.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.72.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2020-8169
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j5s3-rr74-nqb8
100
url VCID-jeqg-g3en-5udw
vulnerability_id VCID-jeqg-g3en-5udw
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5420.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5420.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5420
reference_id
reference_type
scores
0
value 0.01086
scoring_system epss
scoring_elements 0.77847
published_at 2026-04-01T12:55:00Z
1
value 0.01086
scoring_system epss
scoring_elements 0.77944
published_at 2026-04-16T12:55:00Z
2
value 0.01086
scoring_system epss
scoring_elements 0.77907
published_at 2026-04-12T12:55:00Z
3
value 0.01086
scoring_system epss
scoring_elements 0.77906
published_at 2026-04-13T12:55:00Z
4
value 0.01086
scoring_system epss
scoring_elements 0.77854
published_at 2026-04-02T12:55:00Z
5
value 0.01086
scoring_system epss
scoring_elements 0.77882
published_at 2026-04-04T12:55:00Z
6
value 0.01086
scoring_system epss
scoring_elements 0.77864
published_at 2026-04-07T12:55:00Z
7
value 0.01086
scoring_system epss
scoring_elements 0.77891
published_at 2026-04-08T12:55:00Z
8
value 0.01086
scoring_system epss
scoring_elements 0.77896
published_at 2026-04-09T12:55:00Z
9
value 0.01086
scoring_system epss
scoring_elements 0.77923
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5420
2
reference_url https://curl.se/docs/CVE-2016-5420.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-5420.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1362190
reference_id 1362190
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1362190
8
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
9
reference_url https://access.redhat.com/errata/RHSA-2016:2575
reference_id RHSA-2016:2575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2575
10
reference_url https://access.redhat.com/errata/RHSA-2016:2957
reference_id RHSA-2016:2957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2957
11
reference_url https://usn.ubuntu.com/3048-1/
reference_id USN-3048-1
reference_type
scores
url https://usn.ubuntu.com/3048-1/
fixed_packages
0
url pkg:deb/debian/curl@7.50.1-1?distro=trixie
purl pkg:deb/debian/curl@7.50.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.50.1-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-5420
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jeqg-g3en-5udw
101
url VCID-jnfc-8f5d-pyh4
vulnerability_id VCID-jnfc-8f5d-pyh4
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000005.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000005.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000005
reference_id
reference_type
scores
0
value 0.00326
scoring_system epss
scoring_elements 0.55445
published_at 2026-04-01T12:55:00Z
1
value 0.00326
scoring_system epss
scoring_elements 0.55582
published_at 2026-04-13T12:55:00Z
2
value 0.00326
scoring_system epss
scoring_elements 0.55555
published_at 2026-04-02T12:55:00Z
3
value 0.00326
scoring_system epss
scoring_elements 0.5558
published_at 2026-04-04T12:55:00Z
4
value 0.00326
scoring_system epss
scoring_elements 0.55558
published_at 2026-04-07T12:55:00Z
5
value 0.00326
scoring_system epss
scoring_elements 0.55609
published_at 2026-04-08T12:55:00Z
6
value 0.00326
scoring_system epss
scoring_elements 0.55611
published_at 2026-04-09T12:55:00Z
7
value 0.00326
scoring_system epss
scoring_elements 0.5562
published_at 2026-04-16T12:55:00Z
8
value 0.00326
scoring_system epss
scoring_elements 0.55599
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000005
2
reference_url https://curl.se/docs/CVE-2018-1000005.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-1000005.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000005
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1536013
reference_id 1536013
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1536013
5
reference_url https://security.archlinux.org/ASA-201801-20
reference_id ASA-201801-20
reference_type
scores
url https://security.archlinux.org/ASA-201801-20
6
reference_url https://security.archlinux.org/ASA-201801-22
reference_id ASA-201801-22
reference_type
scores
url https://security.archlinux.org/ASA-201801-22
7
reference_url https://security.archlinux.org/ASA-201801-23
reference_id ASA-201801-23
reference_type
scores
url https://security.archlinux.org/ASA-201801-23
8
reference_url https://security.archlinux.org/ASA-201801-24
reference_id ASA-201801-24
reference_type
scores
url https://security.archlinux.org/ASA-201801-24
9
reference_url https://security.archlinux.org/ASA-201801-25
reference_id ASA-201801-25
reference_type
scores
url https://security.archlinux.org/ASA-201801-25
10
reference_url https://security.archlinux.org/ASA-201801-26
reference_id ASA-201801-26
reference_type
scores
url https://security.archlinux.org/ASA-201801-26
11
reference_url https://security.archlinux.org/AVG-593
reference_id AVG-593
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-593
12
reference_url https://security.archlinux.org/AVG-594
reference_id AVG-594
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-594
13
reference_url https://security.archlinux.org/AVG-595
reference_id AVG-595
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-595
14
reference_url https://security.archlinux.org/AVG-596
reference_id AVG-596
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-596
15
reference_url https://security.archlinux.org/AVG-597
reference_id AVG-597
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-597
16
reference_url https://security.archlinux.org/AVG-598
reference_id AVG-598
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-598
17
reference_url https://security.gentoo.org/glsa/201804-04
reference_id GLSA-201804-04
reference_type
scores
url https://security.gentoo.org/glsa/201804-04
18
reference_url https://usn.ubuntu.com/3554-1/
reference_id USN-3554-1
reference_type
scores
url https://usn.ubuntu.com/3554-1/
fixed_packages
0
url pkg:deb/debian/curl@7.58.0-1?distro=trixie
purl pkg:deb/debian/curl@7.58.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.58.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2018-1000005
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jnfc-8f5d-pyh4
102
url VCID-jqqf-gmd3-ubcd
vulnerability_id VCID-jqqf-gmd3-ubcd
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8621.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8621.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8621
reference_id
reference_type
scores
0
value 0.0226
scoring_system epss
scoring_elements 0.84539
published_at 2026-04-01T12:55:00Z
1
value 0.0226
scoring_system epss
scoring_elements 0.84638
published_at 2026-04-16T12:55:00Z
2
value 0.0226
scoring_system epss
scoring_elements 0.84555
published_at 2026-04-02T12:55:00Z
3
value 0.0226
scoring_system epss
scoring_elements 0.84576
published_at 2026-04-04T12:55:00Z
4
value 0.0226
scoring_system epss
scoring_elements 0.8458
published_at 2026-04-07T12:55:00Z
5
value 0.0226
scoring_system epss
scoring_elements 0.84601
published_at 2026-04-08T12:55:00Z
6
value 0.0226
scoring_system epss
scoring_elements 0.84608
published_at 2026-04-09T12:55:00Z
7
value 0.0226
scoring_system epss
scoring_elements 0.84627
published_at 2026-04-11T12:55:00Z
8
value 0.0226
scoring_system epss
scoring_elements 0.84622
published_at 2026-04-12T12:55:00Z
9
value 0.0226
scoring_system epss
scoring_elements 0.84617
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8621
2
reference_url https://curl.se/docs/CVE-2016-8621.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8621.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388385
reference_id 1388385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388385
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
20
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
21
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
22
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
23
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
24
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
25
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
26
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
27
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
28
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:deb/debian/curl@7.51.0-1?distro=trixie
purl pkg:deb/debian/curl@7.51.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-8621
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jqqf-gmd3-ubcd
103
url VCID-jtw4-af4y-nkbk
vulnerability_id VCID-jtw4-af4y-nkbk
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8619.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8619.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8619
reference_id
reference_type
scores
0
value 0.02935
scoring_system epss
scoring_elements 0.86359
published_at 2026-04-01T12:55:00Z
1
value 0.02935
scoring_system epss
scoring_elements 0.86441
published_at 2026-04-16T12:55:00Z
2
value 0.02935
scoring_system epss
scoring_elements 0.8637
published_at 2026-04-02T12:55:00Z
3
value 0.02935
scoring_system epss
scoring_elements 0.86387
published_at 2026-04-04T12:55:00Z
4
value 0.02935
scoring_system epss
scoring_elements 0.86389
published_at 2026-04-07T12:55:00Z
5
value 0.02935
scoring_system epss
scoring_elements 0.86408
published_at 2026-04-08T12:55:00Z
6
value 0.02935
scoring_system epss
scoring_elements 0.86418
published_at 2026-04-09T12:55:00Z
7
value 0.02935
scoring_system epss
scoring_elements 0.86432
published_at 2026-04-11T12:55:00Z
8
value 0.02935
scoring_system epss
scoring_elements 0.8643
published_at 2026-04-12T12:55:00Z
9
value 0.02935
scoring_system epss
scoring_elements 0.86425
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8619
2
reference_url https://curl.se/docs/CVE-2016-8619.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8619.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388379
reference_id 1388379
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388379
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
20
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
21
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
22
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
23
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
24
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
25
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
26
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
27
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
28
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:deb/debian/curl@7.51.0-1?distro=trixie
purl pkg:deb/debian/curl@7.51.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-8619
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jtw4-af4y-nkbk
104
url VCID-ju6h-a1sz-f7e5
vulnerability_id VCID-ju6h-a1sz-f7e5
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in information disclosure or data loss.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8285.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8285.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8285
reference_id
reference_type
scores
0
value 0.00742
scoring_system epss
scoring_elements 0.7291
published_at 2026-04-01T12:55:00Z
1
value 0.00742
scoring_system epss
scoring_elements 0.73008
published_at 2026-04-16T12:55:00Z
2
value 0.00742
scoring_system epss
scoring_elements 0.72994
published_at 2026-04-11T12:55:00Z
3
value 0.00742
scoring_system epss
scoring_elements 0.72973
published_at 2026-04-12T12:55:00Z
4
value 0.00742
scoring_system epss
scoring_elements 0.72967
published_at 2026-04-13T12:55:00Z
5
value 0.00742
scoring_system epss
scoring_elements 0.72922
published_at 2026-04-02T12:55:00Z
6
value 0.00742
scoring_system epss
scoring_elements 0.72942
published_at 2026-04-04T12:55:00Z
7
value 0.00742
scoring_system epss
scoring_elements 0.72917
published_at 2026-04-07T12:55:00Z
8
value 0.00742
scoring_system epss
scoring_elements 0.72955
published_at 2026-04-08T12:55:00Z
9
value 0.00742
scoring_system epss
scoring_elements 0.72968
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8285
2
reference_url https://curl.se/docs/CVE-2020-8285.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2020-8285.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://hackerone.com/reports/1045844
reference_id
reference_type
scores
url https://hackerone.com/reports/1045844
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1902687
reference_id 1902687
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1902687
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977162
reference_id 977162
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977162
15
reference_url https://security.archlinux.org/AVG-1337
reference_id AVG-1337
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1337
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-8285
reference_id CVE-2020-8285
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2020-8285
17
reference_url https://security.gentoo.org/glsa/202012-14
reference_id GLSA-202012-14
reference_type
scores
url https://security.gentoo.org/glsa/202012-14
18
reference_url https://access.redhat.com/errata/RHSA-2021:1610
reference_id RHSA-2021:1610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1610
19
reference_url https://access.redhat.com/errata/RHSA-2021:2471
reference_id RHSA-2021:2471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2471
20
reference_url https://access.redhat.com/errata/RHSA-2021:2472
reference_id RHSA-2021:2472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2472
21
reference_url https://usn.ubuntu.com/4665-1/
reference_id USN-4665-1
reference_type
scores
url https://usn.ubuntu.com/4665-1/
22
reference_url https://usn.ubuntu.com/4665-2/
reference_id USN-4665-2
reference_type
scores
url https://usn.ubuntu.com/4665-2/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2020-8285
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ju6h-a1sz-f7e5
105
url VCID-k8kj-q1je-f7bt
vulnerability_id VCID-k8kj-q1je-f7bt
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7167.json
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7167.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7167
reference_id
reference_type
scores
0
value 0.02289
scoring_system epss
scoring_elements 0.84631
published_at 2026-04-01T12:55:00Z
1
value 0.02289
scoring_system epss
scoring_elements 0.84726
published_at 2026-04-16T12:55:00Z
2
value 0.02289
scoring_system epss
scoring_elements 0.84696
published_at 2026-04-09T12:55:00Z
3
value 0.02289
scoring_system epss
scoring_elements 0.84715
published_at 2026-04-11T12:55:00Z
4
value 0.02289
scoring_system epss
scoring_elements 0.8471
published_at 2026-04-12T12:55:00Z
5
value 0.02289
scoring_system epss
scoring_elements 0.84704
published_at 2026-04-13T12:55:00Z
6
value 0.02289
scoring_system epss
scoring_elements 0.84646
published_at 2026-04-02T12:55:00Z
7
value 0.02289
scoring_system epss
scoring_elements 0.84666
published_at 2026-04-04T12:55:00Z
8
value 0.02289
scoring_system epss
scoring_elements 0.84667
published_at 2026-04-07T12:55:00Z
9
value 0.02289
scoring_system epss
scoring_elements 0.84689
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7167
2
reference_url https://curl.se/docs/CVE-2016-7167.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-7167.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1375906
reference_id 1375906
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1375906
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837945
reference_id 837945
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837945
7
reference_url https://security.archlinux.org/ASA-201609-18
reference_id ASA-201609-18
reference_type
scores
url https://security.archlinux.org/ASA-201609-18
8
reference_url https://security.archlinux.org/ASA-201609-19
reference_id ASA-201609-19
reference_type
scores
url https://security.archlinux.org/ASA-201609-19
9
reference_url https://security.archlinux.org/AVG-20
reference_id AVG-20
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-20
10
reference_url https://security.archlinux.org/AVG-21
reference_id AVG-21
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-21
11
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
12
reference_url https://access.redhat.com/errata/RHSA-2017:2016
reference_id RHSA-2017:2016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2016
13
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:deb/debian/curl@7.51.0-1?distro=trixie
purl pkg:deb/debian/curl@7.51.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-7167
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k8kj-q1je-f7bt
106
url VCID-ke81-x2ze-rbc5
vulnerability_id VCID-ke81-x2ze-rbc5
summary
Double Free
A double free vulnerability exists in libcurl <8.0.0 when sharing HSTS data between separate "handles". This sharing was introduced without considerations for do this sharing across separate threads but there was no indication of this fact in the documentation. Due to missing mutexes or thread locks, two threads sharing the same HSTS data could end up doing a double-free or use-after-free.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27537.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27537.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27537
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14504
published_at 2026-04-08T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14539
published_at 2026-04-02T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14609
published_at 2026-04-04T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14418
published_at 2026-04-07T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14558
published_at 2026-04-09T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14506
published_at 2026-04-11T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.1908
published_at 2026-04-16T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24288
published_at 2026-04-13T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.24345
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27537
2
reference_url https://curl.se/docs/CVE-2023-27537.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-27537.html
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://hackerone.com/reports/1897203
reference_id
reference_type
scores
url https://hackerone.com/reports/1897203
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2179097
reference_id 2179097
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2179097
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-27537
reference_id CVE-2023-27537
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-27537
7
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
url https://security.gentoo.org/glsa/202310-12
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-7?distro=trixie
purl pkg:deb/debian/curl@7.88.1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-7%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2023-27537
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ke81-x2ze-rbc5
107
url VCID-krgt-drpz-y7cy
vulnerability_id VCID-krgt-drpz-y7cy
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000300.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000300.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000300
reference_id
reference_type
scores
0
value 0.0089
scoring_system epss
scoring_elements 0.75468
published_at 2026-04-01T12:55:00Z
1
value 0.0089
scoring_system epss
scoring_elements 0.75565
published_at 2026-04-16T12:55:00Z
2
value 0.0089
scoring_system epss
scoring_elements 0.7547
published_at 2026-04-02T12:55:00Z
3
value 0.0089
scoring_system epss
scoring_elements 0.75501
published_at 2026-04-04T12:55:00Z
4
value 0.0089
scoring_system epss
scoring_elements 0.75482
published_at 2026-04-07T12:55:00Z
5
value 0.0089
scoring_system epss
scoring_elements 0.75524
published_at 2026-04-08T12:55:00Z
6
value 0.0089
scoring_system epss
scoring_elements 0.75533
published_at 2026-04-09T12:55:00Z
7
value 0.0089
scoring_system epss
scoring_elements 0.75553
published_at 2026-04-11T12:55:00Z
8
value 0.0089
scoring_system epss
scoring_elements 0.75531
published_at 2026-04-12T12:55:00Z
9
value 0.0089
scoring_system epss
scoring_elements 0.75522
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000300
2
reference_url https://curl.haxx.se/docs/adv_2018-82c2.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_2018-82c2.html
3
reference_url https://curl.se/docs/CVE-2018-1000300.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-1000300.html
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000300
5
reference_url https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
6
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
7
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
8
reference_url http://www.securityfocus.com/bid/104207
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104207
9
reference_url http://www.securitytracker.com/id/1040933
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040933
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1575533
reference_id 1575533
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1575533
11
reference_url https://security.archlinux.org/ASA-201805-13
reference_id ASA-201805-13
reference_type
scores
url https://security.archlinux.org/ASA-201805-13
12
reference_url https://security.archlinux.org/ASA-201805-14
reference_id ASA-201805-14
reference_type
scores
url https://security.archlinux.org/ASA-201805-14
13
reference_url https://security.archlinux.org/ASA-201805-15
reference_id ASA-201805-15
reference_type
scores
url https://security.archlinux.org/ASA-201805-15
14
reference_url https://security.archlinux.org/ASA-201805-16
reference_id ASA-201805-16
reference_type
scores
url https://security.archlinux.org/ASA-201805-16
15
reference_url https://security.archlinux.org/ASA-201805-17
reference_id ASA-201805-17
reference_type
scores
url https://security.archlinux.org/ASA-201805-17
16
reference_url https://security.archlinux.org/ASA-201805-18
reference_id ASA-201805-18
reference_type
scores
url https://security.archlinux.org/ASA-201805-18
17
reference_url https://security.archlinux.org/AVG-694
reference_id AVG-694
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-694
18
reference_url https://security.archlinux.org/AVG-695
reference_id AVG-695
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-695
19
reference_url https://security.archlinux.org/AVG-696
reference_id AVG-696
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-696
20
reference_url https://security.archlinux.org/AVG-697
reference_id AVG-697
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-697
21
reference_url https://security.archlinux.org/AVG-698
reference_id AVG-698
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-698
22
reference_url https://security.archlinux.org/AVG-699
reference_id AVG-699
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-699
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1000300
reference_id CVE-2018-1000300
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-1000300
29
reference_url https://security.gentoo.org/glsa/201806-05
reference_id GLSA-201806-05
reference_type
scores
url https://security.gentoo.org/glsa/201806-05
30
reference_url https://usn.ubuntu.com/3648-1/
reference_id USN-3648-1
reference_type
scores
url https://usn.ubuntu.com/3648-1/
fixed_packages
0
url pkg:deb/debian/curl@7.60.0-1?distro=trixie
purl pkg:deb/debian/curl@7.60.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.60.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2018-1000300
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-krgt-drpz-y7cy
108
url VCID-ksap-zrmb-ebcu
vulnerability_id VCID-ksap-zrmb-ebcu
summary curl: predictable WebSocket mask
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10148.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10148.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-10148
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.28205
published_at 2026-04-04T12:55:00Z
1
value 0.00102
scoring_system epss
scoring_elements 0.28161
published_at 2026-04-02T12:55:00Z
2
value 0.00102
scoring_system epss
scoring_elements 0.28
published_at 2026-04-07T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30683
published_at 2026-04-16T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30714
published_at 2026-04-08T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30746
published_at 2026-04-09T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30749
published_at 2026-04-11T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30704
published_at 2026-04-12T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30659
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-10148
2
reference_url https://curl.se/docs/CVE-2025-10148.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-12T17:16:46Z/
url https://curl.se/docs/CVE-2025-10148.html
3
reference_url https://hackerone.com/reports/3330839
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-12T17:16:46Z/
url https://hackerone.com/reports/3330839
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2394749
reference_id 2394749
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2394749
5
reference_url https://curl.se/docs/CVE-2025-10148.json
reference_id CVE-2025-10148.json
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-12T17:16:46Z/
url https://curl.se/docs/CVE-2025-10148.json
6
reference_url https://usn.ubuntu.com/8062-1/
reference_id USN-8062-1
reference_type
scores
url https://usn.ubuntu.com/8062-1/
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.16.0-1?distro=trixie
purl pkg:deb/debian/curl@8.16.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.16.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2025-10148
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ksap-zrmb-ebcu
109
url VCID-kt4b-7ffh-4bch
vulnerability_id VCID-kt4b-7ffh-4bch
summary
When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey`
with the curl tool,curl should check the public key of the server certificate
to verify the peer.

This check was skipped in a certain condition that would then make curl allow
the connection without performing the proper check, thus not noticing a
possible impostor. To skip this check, the connection had to be done with QUIC
with ngtcp2 built to use GnuTLS and the user had to explicitly disable the
standard certificate verification.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13034.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13034.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13034
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01204
published_at 2026-04-02T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.012
published_at 2026-04-16T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.0122
published_at 2026-04-07T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01226
published_at 2026-04-08T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.0123
published_at 2026-04-09T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01213
published_at 2026-04-11T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.01207
published_at 2026-04-12T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01209
published_at 2026-04-13T12:55:00Z
8
value 0.00011
scoring_system epss
scoring_elements 0.01211
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13034
2
reference_url https://curl.se/docs/CVE-2025-13034.html
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Medium
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:56:11Z/
url https://curl.se/docs/CVE-2025-13034.html
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2426406
reference_id 2426406
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2426406
5
reference_url https://curl.se/docs/CVE-2025-13034.json
reference_id CVE-2025-13034.json
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:56:11Z/
url https://curl.se/docs/CVE-2025-13034.json
6
reference_url https://usn.ubuntu.com/8062-1/
reference_id USN-8062-1
reference_type
scores
url https://usn.ubuntu.com/8062-1/
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.18.0~rc2-1?distro=trixie
purl pkg:deb/debian/curl@8.18.0~rc2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.18.0~rc2-1%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2025-13034
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kt4b-7ffh-4bch
110
url VCID-m15r-v9sr-2bbn
vulnerability_id VCID-m15r-v9sr-2bbn
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28319.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28319.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28319
reference_id
reference_type
scores
0
value 0.0032
scoring_system epss
scoring_elements 0.55114
published_at 2026-04-12T12:55:00Z
1
value 0.0032
scoring_system epss
scoring_elements 0.55072
published_at 2026-04-02T12:55:00Z
2
value 0.0032
scoring_system epss
scoring_elements 0.55097
published_at 2026-04-13T12:55:00Z
3
value 0.0032
scoring_system epss
scoring_elements 0.55073
published_at 2026-04-07T12:55:00Z
4
value 0.0032
scoring_system epss
scoring_elements 0.55122
published_at 2026-04-09T12:55:00Z
5
value 0.0032
scoring_system epss
scoring_elements 0.55134
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28319
2
reference_url https://curl.se/docs/CVE-2023-28319.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-28319.html
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://hackerone.com/reports/1913733
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/
url https://hackerone.com/reports/1913733
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239
reference_id 1036239
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2196778
reference_id 2196778
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2196778
7
reference_url http://seclists.org/fulldisclosure/2023/Jul/47
reference_id 47
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/
url http://seclists.org/fulldisclosure/2023/Jul/47
8
reference_url http://seclists.org/fulldisclosure/2023/Jul/48
reference_id 48
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/
url http://seclists.org/fulldisclosure/2023/Jul/48
9
reference_url http://seclists.org/fulldisclosure/2023/Jul/52
reference_id 52
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/
url http://seclists.org/fulldisclosure/2023/Jul/52
10
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/
url https://security.gentoo.org/glsa/202310-12
11
reference_url https://support.apple.com/kb/HT213843
reference_id HT213843
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/
url https://support.apple.com/kb/HT213843
12
reference_url https://support.apple.com/kb/HT213844
reference_id HT213844
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/
url https://support.apple.com/kb/HT213844
13
reference_url https://support.apple.com/kb/HT213845
reference_id HT213845
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/
url https://support.apple.com/kb/HT213845
14
reference_url https://security.netapp.com/advisory/ntap-20230609-0009/
reference_id ntap-20230609-0009
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/
url https://security.netapp.com/advisory/ntap-20230609-0009/
15
reference_url https://access.redhat.com/errata/RHSA-2023:4628
reference_id RHSA-2023:4628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4628
16
reference_url https://access.redhat.com/errata/RHSA-2023:4629
reference_id RHSA-2023:4629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4629
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2023-28319
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m15r-v9sr-2bbn
111
url VCID-m3nh-aha9-dfbc
vulnerability_id VCID-m3nh-aha9-dfbc
summary Absolute path traversal vulnerability in curl 7.20.0 through 7.21.1, when the --remote-header-name or -J option is used, allows remote servers to create or overwrite arbitrary files by using \ (backslash) as a separator of path components within the Content-disposition HTTP header.
references
0
reference_url http://curl.haxx.se/docs/adv_20101013.html
reference_id
reference_type
scores
url http://curl.haxx.se/docs/adv_20101013.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-3842
reference_id
reference_type
scores
0
value 0.00898
scoring_system epss
scoring_elements 0.75686
published_at 2026-04-16T12:55:00Z
1
value 0.00898
scoring_system epss
scoring_elements 0.75655
published_at 2026-04-12T12:55:00Z
2
value 0.00898
scoring_system epss
scoring_elements 0.7559
published_at 2026-04-01T12:55:00Z
3
value 0.00898
scoring_system epss
scoring_elements 0.75592
published_at 2026-04-02T12:55:00Z
4
value 0.00898
scoring_system epss
scoring_elements 0.75623
published_at 2026-04-04T12:55:00Z
5
value 0.00898
scoring_system epss
scoring_elements 0.75603
published_at 2026-04-07T12:55:00Z
6
value 0.00898
scoring_system epss
scoring_elements 0.75638
published_at 2026-04-08T12:55:00Z
7
value 0.00898
scoring_system epss
scoring_elements 0.75649
published_at 2026-04-13T12:55:00Z
8
value 0.00898
scoring_system epss
scoring_elements 0.75673
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-3842
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=642642
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=642642
3
reference_url https://curl.se/docs/CVE-2010-3842.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2010-3842.html
4
reference_url http://secunia.com/advisories/39532
reference_id
reference_type
scores
url http://secunia.com/advisories/39532
5
reference_url http://securitytracker.com/id?1024583
reference_id
reference_type
scores
url http://securitytracker.com/id?1024583
6
reference_url http://www.openwall.com/lists/oss-security/2010/10/13/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/13/1
7
reference_url http://www.openwall.com/lists/oss-security/2010/10/13/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/13/4
8
reference_url http://www.openwall.com/lists/oss-security/2010/10/13/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2010/10/13/5
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.20.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.20.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.20.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.20.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.21.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:curl:curl:7.21.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.21.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-3842
reference_id CVE-2010-3842
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-3842
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2010-3842
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m3nh-aha9-dfbc
112
url VCID-m3r3-25yq-hqdc
vulnerability_id VCID-m3r3-25yq-hqdc
summary Curl before 7.49.1 in Apple OS X before macOS Sierra prior to 10.12 allows remote or local attackers to execute arbitrary code, gain sensitive information, cause denial-of-service conditions, bypass security restrictions, and perform unauthorized actions. This may aid in other attacks.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4606
reference_id
reference_type
scores
0
value 0.00218
scoring_system epss
scoring_elements 0.44368
published_at 2026-04-01T12:55:00Z
1
value 0.00218
scoring_system epss
scoring_elements 0.44439
published_at 2026-04-02T12:55:00Z
2
value 0.00218
scoring_system epss
scoring_elements 0.4446
published_at 2026-04-04T12:55:00Z
3
value 0.00218
scoring_system epss
scoring_elements 0.44395
published_at 2026-04-07T12:55:00Z
4
value 0.00218
scoring_system epss
scoring_elements 0.44446
published_at 2026-04-08T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.44453
published_at 2026-04-09T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.4447
published_at 2026-04-11T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44438
published_at 2026-04-12T12:55:00Z
8
value 0.00218
scoring_system epss
scoring_elements 0.44437
published_at 2026-04-13T12:55:00Z
9
value 0.00218
scoring_system epss
scoring_elements 0.44494
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4606
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-4606
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m3r3-25yq-hqdc
113
url VCID-m5fs-um7r-9qh2
vulnerability_id VCID-m5fs-um7r-9qh2
summary curl: libcurl: WebSocket endless loop
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5399.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5399.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-5399
reference_id
reference_type
scores
0
value 0.0021
scoring_system epss
scoring_elements 0.43448
published_at 2026-04-02T12:55:00Z
1
value 0.00486
scoring_system epss
scoring_elements 0.65404
published_at 2026-04-16T12:55:00Z
2
value 0.00486
scoring_system epss
scoring_elements 0.65362
published_at 2026-04-04T12:55:00Z
3
value 0.00486
scoring_system epss
scoring_elements 0.65326
published_at 2026-04-07T12:55:00Z
4
value 0.00486
scoring_system epss
scoring_elements 0.65378
published_at 2026-04-08T12:55:00Z
5
value 0.00486
scoring_system epss
scoring_elements 0.65389
published_at 2026-04-09T12:55:00Z
6
value 0.00486
scoring_system epss
scoring_elements 0.65409
published_at 2026-04-11T12:55:00Z
7
value 0.00486
scoring_system epss
scoring_elements 0.65396
published_at 2026-04-12T12:55:00Z
8
value 0.00486
scoring_system epss
scoring_elements 0.65368
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-5399
2
reference_url https://curl.se/docs/CVE-2025-5399.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T13:20:18Z/
url https://curl.se/docs/CVE-2025-5399.html
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://hackerone.com/reports/3168039
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T13:20:18Z/
url https://hackerone.com/reports/3168039
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2370920
reference_id 2370920
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2370920
6
reference_url https://security.archlinux.org/ASA-202506-2
reference_id ASA-202506-2
reference_type
scores
url https://security.archlinux.org/ASA-202506-2
7
reference_url https://security.archlinux.org/AVG-2895
reference_id AVG-2895
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2895
8
reference_url https://curl.se/docs/CVE-2025-5399.json
reference_id CVE-2025-5399.json
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T13:20:18Z/
url https://curl.se/docs/CVE-2025-5399.json
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-1?distro=trixie
purl pkg:deb/debian/curl@8.14.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-1%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2025-5399
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m5fs-um7r-9qh2
114
url VCID-ma8s-he6x-z7a8
vulnerability_id VCID-ma8s-he6x-z7a8
summary curl and libcurl 7.27.0 through 7.35.0, when running on Windows and using the SChannel/Winssl TLS backend, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP address, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-2522
reference_id
reference_type
scores
0
value 0.00292
scoring_system epss
scoring_elements 0.52599
published_at 2026-04-16T12:55:00Z
1
value 0.00292
scoring_system epss
scoring_elements 0.52452
published_at 2026-04-01T12:55:00Z
2
value 0.00292
scoring_system epss
scoring_elements 0.52498
published_at 2026-04-02T12:55:00Z
3
value 0.00292
scoring_system epss
scoring_elements 0.52525
published_at 2026-04-04T12:55:00Z
4
value 0.00292
scoring_system epss
scoring_elements 0.52491
published_at 2026-04-07T12:55:00Z
5
value 0.00292
scoring_system epss
scoring_elements 0.52544
published_at 2026-04-08T12:55:00Z
6
value 0.00292
scoring_system epss
scoring_elements 0.52539
published_at 2026-04-09T12:55:00Z
7
value 0.00292
scoring_system epss
scoring_elements 0.5259
published_at 2026-04-11T12:55:00Z
8
value 0.00292
scoring_system epss
scoring_elements 0.52574
published_at 2026-04-12T12:55:00Z
9
value 0.00292
scoring_system epss
scoring_elements 0.52559
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-2522
1
reference_url https://curl.se/docs/CVE-2014-2522.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2014-2522.html
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2014-2522
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ma8s-he6x-z7a8
115
url VCID-mkyr-w79c-qqfz
vulnerability_id VCID-mkyr-w79c-qqfz
summary curl: curl: Security bypass due to global TLS option changes in multi-threaded LDAPS transfers
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14017.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14017.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14017
reference_id
reference_type
scores
0
value 7e-05
scoring_system epss
scoring_elements 0.00579
published_at 2026-04-16T12:55:00Z
1
value 7e-05
scoring_system epss
scoring_elements 0.00593
published_at 2026-04-08T12:55:00Z
2
value 7e-05
scoring_system epss
scoring_elements 0.00595
published_at 2026-04-07T12:55:00Z
3
value 7e-05
scoring_system epss
scoring_elements 0.00587
published_at 2026-04-09T12:55:00Z
4
value 7e-05
scoring_system epss
scoring_elements 0.00586
published_at 2026-04-11T12:55:00Z
5
value 7e-05
scoring_system epss
scoring_elements 0.00582
published_at 2026-04-12T12:55:00Z
6
value 7e-05
scoring_system epss
scoring_elements 0.00583
published_at 2026-04-13T12:55:00Z
7
value 7e-05
scoring_system epss
scoring_elements 0.006
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14017
2
reference_url https://curl.se/docs/CVE-2025-14017.html
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Medium
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-16T15:39:09Z/
url https://curl.se/docs/CVE-2025-14017.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14017
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2427870
reference_id 2427870
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2427870
6
reference_url https://curl.se/docs/CVE-2025-14017.json
reference_id CVE-2025-14017.json
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-16T15:39:09Z/
url https://curl.se/docs/CVE-2025-14017.json
7
reference_url https://usn.ubuntu.com/8062-1/
reference_id USN-8062-1
reference_type
scores
url https://usn.ubuntu.com/8062-1/
8
reference_url https://usn.ubuntu.com/8062-2/
reference_id USN-8062-2
reference_type
scores
url https://usn.ubuntu.com/8062-2/
fixed_packages
0
url pkg:deb/debian/curl@8.18.0~rc2-1?distro=trixie
purl pkg:deb/debian/curl@8.18.0~rc2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.18.0~rc2-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2025-14017
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mkyr-w79c-qqfz
116
url VCID-ms2r-94ph-yyh3
vulnerability_id VCID-ms2r-94ph-yyh3
summary
Improper Authentication
An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27536.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27536.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27536
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01282
published_at 2026-04-16T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01285
published_at 2026-04-02T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.0129
published_at 2026-04-04T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01301
published_at 2026-04-07T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01306
published_at 2026-04-08T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.0131
published_at 2026-04-09T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.01294
published_at 2026-04-11T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01288
published_at 2026-04-12T12:55:00Z
8
value 0.00011
scoring_system epss
scoring_elements 0.01291
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27536
2
reference_url https://curl.se/docs/CVE-2023-27536.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-27536.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27536
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1895135
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T15:39:19Z/
url https://hackerone.com/reports/1895135
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2179092
reference_id 2179092
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2179092
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
reference_id 36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T15:39:19Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-27536
reference_id CVE-2023-27536
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-27536
10
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T15:39:19Z/
url https://security.gentoo.org/glsa/202310-12
11
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
reference_id msg00025.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T15:39:19Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
12
reference_url https://security.netapp.com/advisory/ntap-20230420-0010/
reference_id ntap-20230420-0010
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T15:39:19Z/
url https://security.netapp.com/advisory/ntap-20230420-0010/
13
reference_url https://access.redhat.com/errata/RHSA-2023:4523
reference_id RHSA-2023:4523
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4523
14
reference_url https://access.redhat.com/errata/RHSA-2023:6679
reference_id RHSA-2023:6679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6679
15
reference_url https://access.redhat.com/errata/RHSA-2024:0428
reference_id RHSA-2024:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0428
16
reference_url https://usn.ubuntu.com/5964-1/
reference_id USN-5964-1
reference_type
scores
url https://usn.ubuntu.com/5964-1/
17
reference_url https://usn.ubuntu.com/5964-2/
reference_id USN-5964-2
reference_type
scores
url https://usn.ubuntu.com/5964-2/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u8?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u8%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-7?distro=trixie
purl pkg:deb/debian/curl@7.88.1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-7%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2023-27536
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ms2r-94ph-yyh3
117
url VCID-my7a-jeng-5bhw
vulnerability_id VCID-my7a-jeng-5bhw
summary curl: macidn punycode buffer overread
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6874.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6874.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6874
reference_id
reference_type
scores
0
value 0.0099
scoring_system epss
scoring_elements 0.7692
published_at 2026-04-16T12:55:00Z
1
value 0.0099
scoring_system epss
scoring_elements 0.76826
published_at 2026-04-02T12:55:00Z
2
value 0.0099
scoring_system epss
scoring_elements 0.76855
published_at 2026-04-04T12:55:00Z
3
value 0.0099
scoring_system epss
scoring_elements 0.76835
published_at 2026-04-07T12:55:00Z
4
value 0.0099
scoring_system epss
scoring_elements 0.76866
published_at 2026-04-08T12:55:00Z
5
value 0.0099
scoring_system epss
scoring_elements 0.76877
published_at 2026-04-09T12:55:00Z
6
value 0.0099
scoring_system epss
scoring_elements 0.76905
published_at 2026-04-11T12:55:00Z
7
value 0.0099
scoring_system epss
scoring_elements 0.76884
published_at 2026-04-12T12:55:00Z
8
value 0.0099
scoring_system epss
scoring_elements 0.76879
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6874
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076996
reference_id 1076996
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076996
4
reference_url http://www.openwall.com/lists/oss-security/2024/07/24/2
reference_id 2
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T16:13:40Z/
url http://www.openwall.com/lists/oss-security/2024/07/24/2
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2299654
reference_id 2299654
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2299654
6
reference_url https://hackerone.com/reports/2604391
reference_id 2604391
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T16:13:40Z/
url https://hackerone.com/reports/2604391
7
reference_url https://curl.se/docs/CVE-2024-6874.html
reference_id CVE-2024-6874.html
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T16:13:40Z/
url https://curl.se/docs/CVE-2024-6874.html
8
reference_url https://curl.se/docs/CVE-2024-6874.json
reference_id CVE-2024-6874.json
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T16:13:40Z/
url https://curl.se/docs/CVE-2024-6874.json
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.9.0-1?distro=trixie
purl pkg:deb/debian/curl@8.9.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.9.0-1%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2024-6874
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-my7a-jeng-5bhw
118
url VCID-n51k-39uk-auca
vulnerability_id VCID-n51k-39uk-auca
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in information disclosure or data loss.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8286.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8286.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8286
reference_id
reference_type
scores
0
value 0.00286
scoring_system epss
scoring_elements 0.52154
published_at 2026-04-16T12:55:00Z
1
value 0.00286
scoring_system epss
scoring_elements 0.52128
published_at 2026-04-12T12:55:00Z
2
value 0.00286
scoring_system epss
scoring_elements 0.52113
published_at 2026-04-13T12:55:00Z
3
value 0.00384
scoring_system epss
scoring_elements 0.59717
published_at 2026-04-11T12:55:00Z
4
value 0.00384
scoring_system epss
scoring_elements 0.59638
published_at 2026-04-02T12:55:00Z
5
value 0.00384
scoring_system epss
scoring_elements 0.59662
published_at 2026-04-04T12:55:00Z
6
value 0.00384
scoring_system epss
scoring_elements 0.59564
published_at 2026-04-01T12:55:00Z
7
value 0.00384
scoring_system epss
scoring_elements 0.59632
published_at 2026-04-07T12:55:00Z
8
value 0.00384
scoring_system epss
scoring_elements 0.59683
published_at 2026-04-08T12:55:00Z
9
value 0.00384
scoring_system epss
scoring_elements 0.59697
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8286
2
reference_url https://curl.se/docs/CVE-2020-8286.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url https://curl.se/docs/CVE-2020-8286.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://hackerone.com/reports/1048457
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url https://hackerone.com/reports/1048457
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1906096
reference_id 1906096
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1906096
14
reference_url http://seclists.org/fulldisclosure/2021/Apr/50
reference_id 50
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url http://seclists.org/fulldisclosure/2021/Apr/50
15
reference_url http://seclists.org/fulldisclosure/2021/Apr/51
reference_id 51
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url http://seclists.org/fulldisclosure/2021/Apr/51
16
reference_url http://seclists.org/fulldisclosure/2021/Apr/54
reference_id 54
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url http://seclists.org/fulldisclosure/2021/Apr/54
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977161
reference_id 977161
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977161
18
reference_url https://security.archlinux.org/AVG-1337
reference_id AVG-1337
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1337
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-8286
reference_id CVE-2020-8286
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2020-8286
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
reference_id DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
21
reference_url https://www.debian.org/security/2021/dsa-4881
reference_id dsa-4881
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url https://www.debian.org/security/2021/dsa-4881
22
reference_url https://security.gentoo.org/glsa/202012-14
reference_id GLSA-202012-14
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url https://security.gentoo.org/glsa/202012-14
23
reference_url https://support.apple.com/kb/HT212325
reference_id HT212325
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url https://support.apple.com/kb/HT212325
24
reference_url https://support.apple.com/kb/HT212326
reference_id HT212326
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url https://support.apple.com/kb/HT212326
25
reference_url https://support.apple.com/kb/HT212327
reference_id HT212327
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url https://support.apple.com/kb/HT212327
26
reference_url https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html
reference_id msg00029.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html
27
reference_url https://security.netapp.com/advisory/ntap-20210122-0007/
reference_id ntap-20210122-0007
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url https://security.netapp.com/advisory/ntap-20210122-0007/
28
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
reference_id NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
29
reference_url https://access.redhat.com/errata/RHSA-2021:1610
reference_id RHSA-2021:1610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1610
30
reference_url https://access.redhat.com/errata/RHSA-2021:2471
reference_id RHSA-2021:2471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2471
31
reference_url https://access.redhat.com/errata/RHSA-2021:2472
reference_id RHSA-2021:2472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2472
32
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf
reference_id ssa-200951.pdf
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf
33
reference_url https://usn.ubuntu.com/4665-1/
reference_id USN-4665-1
reference_type
scores
url https://usn.ubuntu.com/4665-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2020-8286
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n51k-39uk-auca
119
url VCID-n57n-cymy-z7dr
vulnerability_id VCID-n57n-cymy-z7dr
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23916.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23916.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23916
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.25909
published_at 2026-04-16T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.2607
published_at 2026-04-02T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.2611
published_at 2026-04-04T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25878
published_at 2026-04-07T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25948
published_at 2026-04-08T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25999
published_at 2026-04-09T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.26009
published_at 2026-04-11T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25964
published_at 2026-04-12T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25905
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23916
2
reference_url https://curl.se/docs/CVE-2023-23916.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-23916.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23916
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1826048
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T18:24:35Z/
url https://hackerone.com/reports/1826048
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031371
reference_id 1031371
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031371
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2167815
reference_id 2167815
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2167815
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQKE6TXYDHOTFHLTBZ5X73GTKI7II5KO/
reference_id BQKE6TXYDHOTFHLTBZ5X73GTKI7II5KO
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T18:24:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQKE6TXYDHOTFHLTBZ5X73GTKI7II5KO/
9
reference_url https://www.debian.org/security/2023/dsa-5365
reference_id dsa-5365
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T18:24:35Z/
url https://www.debian.org/security/2023/dsa-5365
10
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T18:24:35Z/
url https://security.gentoo.org/glsa/202310-12
11
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00035.html
reference_id msg00035.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T18:24:35Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00035.html
12
reference_url https://security.netapp.com/advisory/ntap-20230309-0006/
reference_id ntap-20230309-0006
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T18:24:35Z/
url https://security.netapp.com/advisory/ntap-20230309-0006/
13
reference_url https://access.redhat.com/errata/RHSA-2023:1140
reference_id RHSA-2023:1140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1140
14
reference_url https://access.redhat.com/errata/RHSA-2023:1701
reference_id RHSA-2023:1701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1701
15
reference_url https://access.redhat.com/errata/RHSA-2023:1842
reference_id RHSA-2023:1842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1842
16
reference_url https://access.redhat.com/errata/RHSA-2023:3354
reference_id RHSA-2023:3354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3354
17
reference_url https://access.redhat.com/errata/RHSA-2023:3355
reference_id RHSA-2023:3355
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3355
18
reference_url https://access.redhat.com/errata/RHSA-2023:3460
reference_id RHSA-2023:3460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3460
19
reference_url https://access.redhat.com/errata/RHSA-2023:4139
reference_id RHSA-2023:4139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4139
20
reference_url https://usn.ubuntu.com/5891-1/
reference_id USN-5891-1
reference_type
scores
url https://usn.ubuntu.com/5891-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u7%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-1?distro=trixie
purl pkg:deb/debian/curl@7.88.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2023-23916
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n57n-cymy-z7dr
120
url VCID-nvzd-v3bs-6qek
vulnerability_id VCID-nvzd-v3bs-6qek
summary When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-15079.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-15079.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-15079
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10292
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10237
published_at 2026-04-16T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10359
published_at 2026-04-04T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.1026
published_at 2026-04-07T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10333
published_at 2026-04-08T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10399
published_at 2026-04-09T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10428
published_at 2026-04-11T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10388
published_at 2026-04-12T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10366
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-15079
2
reference_url https://curl.se/docs/CVE-2025-15079.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:45:34Z/
url https://curl.se/docs/CVE-2025-15079.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15079
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/3477116
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:45:34Z/
url https://hackerone.com/reports/3477116
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2426409
reference_id 2426409
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2426409
7
reference_url https://curl.se/docs/CVE-2025-15079.json
reference_id CVE-2025-15079.json
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:45:34Z/
url https://curl.se/docs/CVE-2025-15079.json
8
reference_url https://usn.ubuntu.com/8062-1/
reference_id USN-8062-1
reference_type
scores
url https://usn.ubuntu.com/8062-1/
9
reference_url https://usn.ubuntu.com/8062-2/
reference_id USN-8062-2
reference_type
scores
url https://usn.ubuntu.com/8062-2/
fixed_packages
0
url pkg:deb/debian/curl@8.18.0~rc3-1?distro=trixie
purl pkg:deb/debian/curl@8.18.0~rc3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.18.0~rc3-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2025-15079
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nvzd-v3bs-6qek
121
url VCID-ph5u-5j8n-4qah
vulnerability_id VCID-ph5u-5j8n-4qah
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22898.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22898.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22898
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.31806
published_at 2026-04-01T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.3184
published_at 2026-04-16T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.31935
published_at 2026-04-02T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.31977
published_at 2026-04-04T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.31797
published_at 2026-04-07T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.31849
published_at 2026-04-08T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31879
published_at 2026-04-09T12:55:00Z
7
value 0.00126
scoring_system epss
scoring_elements 0.31882
published_at 2026-04-11T12:55:00Z
8
value 0.00126
scoring_system epss
scoring_elements 0.31843
published_at 2026-04-12T12:55:00Z
9
value 0.00126
scoring_system epss
scoring_elements 0.31808
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22898
2
reference_url https://curl.se/docs/CVE-2021-22898.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22898.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1176461
reference_id
reference_type
scores
url https://hackerone.com/reports/1176461
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1964887
reference_id 1964887
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1964887
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989228
reference_id 989228
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989228
22
reference_url https://security.archlinux.org/ASA-202106-4
reference_id ASA-202106-4
reference_type
scores
url https://security.archlinux.org/ASA-202106-4
23
reference_url https://security.archlinux.org/ASA-202106-5
reference_id ASA-202106-5
reference_type
scores
url https://security.archlinux.org/ASA-202106-5
24
reference_url https://security.archlinux.org/ASA-202106-6
reference_id ASA-202106-6
reference_type
scores
url https://security.archlinux.org/ASA-202106-6
25
reference_url https://security.archlinux.org/ASA-202106-7
reference_id ASA-202106-7
reference_type
scores
url https://security.archlinux.org/ASA-202106-7
26
reference_url https://security.archlinux.org/ASA-202106-8
reference_id ASA-202106-8
reference_type
scores
url https://security.archlinux.org/ASA-202106-8
27
reference_url https://security.archlinux.org/ASA-202106-9
reference_id ASA-202106-9
reference_type
scores
url https://security.archlinux.org/ASA-202106-9
28
reference_url https://security.archlinux.org/AVG-1995
reference_id AVG-1995
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1995
29
reference_url https://security.archlinux.org/AVG-1996
reference_id AVG-1996
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1996
30
reference_url https://security.archlinux.org/AVG-1997
reference_id AVG-1997
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1997
31
reference_url https://security.archlinux.org/AVG-1998
reference_id AVG-1998
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1998
32
reference_url https://security.archlinux.org/AVG-1999
reference_id AVG-1999
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1999
33
reference_url https://security.archlinux.org/AVG-2000
reference_id AVG-2000
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2000
34
reference_url https://security.gentoo.org/glsa/202105-36
reference_id GLSA-202105-36
reference_type
scores
url https://security.gentoo.org/glsa/202105-36
35
reference_url https://access.redhat.com/errata/RHSA-2021:4511
reference_id RHSA-2021:4511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4511
36
reference_url https://usn.ubuntu.com/5021-1/
reference_id USN-5021-1
reference_type
scores
url https://usn.ubuntu.com/5021-1/
37
reference_url https://usn.ubuntu.com/5021-2/
reference_id USN-5021-2
reference_type
scores
url https://usn.ubuntu.com/5021-2/
38
reference_url https://usn.ubuntu.com/5894-1/
reference_id USN-5894-1
reference_type
scores
url https://usn.ubuntu.com/5894-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.79.1-1?distro=trixie
purl pkg:deb/debian/curl@7.79.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.79.1-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2021-22898
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ph5u-5j8n-4qah
122
url VCID-prff-34kh-kbat
vulnerability_id VCID-prff-34kh-kbat
summary
Multiple vulnerabilities have been found in cURL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url http://curl.haxx.se/docs/adv_20130412.html
reference_id
reference_type
scores
url http://curl.haxx.se/docs/adv_20130412.html
1
reference_url http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html
6
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html
7
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html
9
reference_url http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html
10
reference_url http://rhn.redhat.com/errata/RHSA-2013-0771.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0771.html
11
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1944.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1944.json
12
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1944
reference_id
reference_type
scores
0
value 0.02482
scoring_system epss
scoring_elements 0.85315
published_at 2026-04-16T12:55:00Z
1
value 0.02482
scoring_system epss
scoring_elements 0.85295
published_at 2026-04-13T12:55:00Z
2
value 0.02482
scoring_system epss
scoring_elements 0.85223
published_at 2026-04-01T12:55:00Z
3
value 0.02482
scoring_system epss
scoring_elements 0.85234
published_at 2026-04-02T12:55:00Z
4
value 0.02482
scoring_system epss
scoring_elements 0.85253
published_at 2026-04-04T12:55:00Z
5
value 0.02482
scoring_system epss
scoring_elements 0.85255
published_at 2026-04-07T12:55:00Z
6
value 0.02482
scoring_system epss
scoring_elements 0.85277
published_at 2026-04-08T12:55:00Z
7
value 0.02482
scoring_system epss
scoring_elements 0.85285
published_at 2026-04-09T12:55:00Z
8
value 0.02482
scoring_system epss
scoring_elements 0.853
published_at 2026-04-11T12:55:00Z
9
value 0.02482
scoring_system epss
scoring_elements 0.85298
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1944
13
reference_url https://curl.se/docs/CVE-2013-1944.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2013-1944.html
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944
15
reference_url http://secunia.com/advisories/53044
reference_id
reference_type
scores
url http://secunia.com/advisories/53044
16
reference_url http://secunia.com/advisories/53051
reference_id
reference_type
scores
url http://secunia.com/advisories/53051
17
reference_url http://secunia.com/advisories/53097
reference_id
reference_type
scores
url http://secunia.com/advisories/53097
18
reference_url https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66
reference_id
reference_type
scores
url https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66
19
reference_url https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121
reference_id
reference_type
scores
url https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121
20
reference_url http://www.debian.org/security/2012/dsa-2660
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2660
21
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:151
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:151
22
reference_url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
23
reference_url http://www.osvdb.org/92316
reference_id
reference_type
scores
url http://www.osvdb.org/92316
24
reference_url http://www.securityfocus.com/bid/59058
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/59058
25
reference_url http://www.ubuntu.com/usn/USN-1801-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1801-1
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=705274
reference_id 705274
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=705274
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=950577
reference_id 950577
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=950577
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.1:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.1:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:6.1:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.1:beta:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:6.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.3.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:6.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5.1:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:6.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.1.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.2:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.2.1:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.3:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.2:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.5.1:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.5.2:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.6:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.6.1:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
149
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
150
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
151
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
152
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
153
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
154
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
155
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
156
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
157
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
158
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*
159
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1944
reference_id CVE-2013-1944
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-1944
160
reference_url https://security.gentoo.org/glsa/201401-14
reference_id GLSA-201401-14
reference_type
scores
url https://security.gentoo.org/glsa/201401-14
161
reference_url https://access.redhat.com/errata/RHSA-2013:0771
reference_id RHSA-2013:0771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0771
162
reference_url https://usn.ubuntu.com/1801-1/
reference_id USN-1801-1
reference_type
scores
url https://usn.ubuntu.com/1801-1/
fixed_packages
0
url pkg:deb/debian/curl@7.29.0-2.1?distro=trixie
purl pkg:deb/debian/curl@7.29.0-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.29.0-2.1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2013-1944
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-prff-34kh-kbat
123
url VCID-pwn6-j8vf-rufk
vulnerability_id VCID-pwn6-j8vf-rufk
summary curl: HSTS subdomain overwrites parent cache entry
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9681.json
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9681.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9681
reference_id
reference_type
scores
0
value 0.00725
scoring_system epss
scoring_elements 0.72605
published_at 2026-04-16T12:55:00Z
1
value 0.00725
scoring_system epss
scoring_elements 0.72522
published_at 2026-04-02T12:55:00Z
2
value 0.00725
scoring_system epss
scoring_elements 0.72539
published_at 2026-04-04T12:55:00Z
3
value 0.00725
scoring_system epss
scoring_elements 0.72515
published_at 2026-04-07T12:55:00Z
4
value 0.00725
scoring_system epss
scoring_elements 0.72554
published_at 2026-04-08T12:55:00Z
5
value 0.00725
scoring_system epss
scoring_elements 0.72566
published_at 2026-04-09T12:55:00Z
6
value 0.00725
scoring_system epss
scoring_elements 0.7259
published_at 2026-04-11T12:55:00Z
7
value 0.00725
scoring_system epss
scoring_elements 0.72572
published_at 2026-04-12T12:55:00Z
8
value 0.00725
scoring_system epss
scoring_elements 0.72562
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9681
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9681
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9681
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086804
reference_id 1086804
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086804
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2322969
reference_id 2322969
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2322969
6
reference_url https://hackerone.com/reports/2764830
reference_id 2764830
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:16:59Z/
url https://hackerone.com/reports/2764830
7
reference_url https://curl.se/docs/CVE-2024-9681.html
reference_id CVE-2024-9681.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:16:59Z/
url https://curl.se/docs/CVE-2024-9681.html
8
reference_url https://curl.se/docs/CVE-2024-9681.json
reference_id CVE-2024-9681.json
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:16:59Z/
url https://curl.se/docs/CVE-2024-9681.json
9
reference_url https://usn.ubuntu.com/7104-1/
reference_id USN-7104-1
reference_type
scores
url https://usn.ubuntu.com/7104-1/
fixed_packages
0
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u9?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u9%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
2
url pkg:deb/debian/curl@8.11.0-1?distro=trixie
purl pkg:deb/debian/curl@8.11.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.11.0-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2024-9681
risk_score 2.4
exploitability 0.5
weighted_severity 4.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pwn6-j8vf-rufk
124
url VCID-q229-ag6u-u3hv
vulnerability_id VCID-q229-ag6u-u3hv
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22576.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22576.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22576
reference_id
reference_type
scores
0
value 0.00272
scoring_system epss
scoring_elements 0.50585
published_at 2026-04-02T12:55:00Z
1
value 0.00272
scoring_system epss
scoring_elements 0.50613
published_at 2026-04-04T12:55:00Z
2
value 0.00339
scoring_system epss
scoring_elements 0.56699
published_at 2026-04-16T12:55:00Z
3
value 0.00339
scoring_system epss
scoring_elements 0.5669
published_at 2026-04-12T12:55:00Z
4
value 0.00339
scoring_system epss
scoring_elements 0.56669
published_at 2026-04-13T12:55:00Z
5
value 0.00357
scoring_system epss
scoring_elements 0.57955
published_at 2026-04-07T12:55:00Z
6
value 0.00357
scoring_system epss
scoring_elements 0.5801
published_at 2026-04-08T12:55:00Z
7
value 0.00357
scoring_system epss
scoring_elements 0.58012
published_at 2026-04-09T12:55:00Z
8
value 0.00357
scoring_system epss
scoring_elements 0.58028
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22576
2
reference_url https://curl.se/docs/CVE-2022-22576.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-22576.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1526328
reference_id
reference_type
scores
url https://hackerone.com/reports/1526328
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010295
reference_id 1010295
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010295
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2077541
reference_id 2077541
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2077541
22
reference_url https://security.archlinux.org/AVG-2685
reference_id AVG-2685
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2685
23
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
url https://security.gentoo.org/glsa/202212-01
24
reference_url https://access.redhat.com/errata/RHSA-2022:5245
reference_id RHSA-2022:5245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5245
25
reference_url https://access.redhat.com/errata/RHSA-2022:5313
reference_id RHSA-2022:5313
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5313
26
reference_url https://usn.ubuntu.com/5397-1/
reference_id USN-5397-1
reference_type
scores
url https://usn.ubuntu.com/5397-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.83.0-1?distro=trixie
purl pkg:deb/debian/curl@7.83.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.0-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2022-22576
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q229-ag6u-u3hv
125
url VCID-q3hu-8uy5-e3a4
vulnerability_id VCID-q3hu-8uy5-e3a4
summary
A coding error has been found in cURL, causing the TLS Certificate
    Status Request extension check to always return true.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2629.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2629.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-2629
reference_id
reference_type
scores
0
value 0.00363
scoring_system epss
scoring_elements 0.58261
published_at 2026-04-01T12:55:00Z
1
value 0.00363
scoring_system epss
scoring_elements 0.58408
published_at 2026-04-16T12:55:00Z
2
value 0.00363
scoring_system epss
scoring_elements 0.58346
published_at 2026-04-02T12:55:00Z
3
value 0.00363
scoring_system epss
scoring_elements 0.58366
published_at 2026-04-04T12:55:00Z
4
value 0.00363
scoring_system epss
scoring_elements 0.5834
published_at 2026-04-07T12:55:00Z
5
value 0.00363
scoring_system epss
scoring_elements 0.58393
published_at 2026-04-08T12:55:00Z
6
value 0.00363
scoring_system epss
scoring_elements 0.58399
published_at 2026-04-09T12:55:00Z
7
value 0.00363
scoring_system epss
scoring_elements 0.58416
published_at 2026-04-11T12:55:00Z
8
value 0.00363
scoring_system epss
scoring_elements 0.58395
published_at 2026-04-12T12:55:00Z
9
value 0.00363
scoring_system epss
scoring_elements 0.58376
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-2629
2
reference_url https://curl.se/docs/CVE-2017-2629.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2017-2629.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2629
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1425746
reference_id 1425746
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1425746
6
reference_url https://security.archlinux.org/ASA-201703-1
reference_id ASA-201703-1
reference_type
scores
url https://security.archlinux.org/ASA-201703-1
7
reference_url https://security.archlinux.org/AVG-179
reference_id AVG-179
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-179
8
reference_url https://security.archlinux.org/AVG-180
reference_id AVG-180
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-180
9
reference_url https://security.archlinux.org/AVG-181
reference_id AVG-181
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-181
10
reference_url https://security.archlinux.org/AVG-182
reference_id AVG-182
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-182
11
reference_url https://security.archlinux.org/AVG-183
reference_id AVG-183
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-183
12
reference_url https://security.archlinux.org/AVG-184
reference_id AVG-184
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-184
13
reference_url https://security.gentoo.org/glsa/201703-04
reference_id GLSA-201703-04
reference_type
scores
url https://security.gentoo.org/glsa/201703-04
fixed_packages
0
url pkg:deb/debian/curl@7.52.1-3?distro=trixie
purl pkg:deb/debian/curl@7.52.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.52.1-3%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2017-2629
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q3hu-8uy5-e3a4
126
url VCID-qbpd-star-6fgn
vulnerability_id VCID-qbpd-star-6fgn
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22923.json
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22923.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22923
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.25873
published_at 2026-04-01T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25784
published_at 2026-04-16T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.25937
published_at 2026-04-02T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25978
published_at 2026-04-04T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25745
published_at 2026-04-07T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25816
published_at 2026-04-08T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25868
published_at 2026-04-09T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25879
published_at 2026-04-11T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25838
published_at 2026-04-12T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.25782
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22923
2
reference_url https://curl.se/docs/CVE-2021-22923.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22923.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22923
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1213181
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:25:07Z/
url https://hackerone.com/reports/1213181
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1981438
reference_id 1981438
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1981438
7
reference_url https://security.archlinux.org/ASA-202107-59
reference_id ASA-202107-59
reference_type
scores
url https://security.archlinux.org/ASA-202107-59
8
reference_url https://security.archlinux.org/AVG-2194
reference_id AVG-2194
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2194
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
reference_id FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:25:07Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
10
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:25:07Z/
url https://security.gentoo.org/glsa/202212-01
11
reference_url https://security.netapp.com/advisory/ntap-20210902-0003/
reference_id ntap-20210902-0003
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:25:07Z/
url https://security.netapp.com/advisory/ntap-20210902-0003/
12
reference_url https://access.redhat.com/errata/RHSA-2021:3582
reference_id RHSA-2021:3582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3582
13
reference_url https://access.redhat.com/errata/RHSA-2021:3903
reference_id RHSA-2021:3903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3903
fixed_packages
0
url pkg:deb/debian/curl@7.79.1-1?distro=trixie
purl pkg:deb/debian/curl@7.79.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.79.1-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
2
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2021-22923
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qbpd-star-6fgn
127
url VCID-qdcn-2u3v-b3cv
vulnerability_id VCID-qdcn-2u3v-b3cv
summary Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46218.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46218.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-46218
reference_id
reference_type
scores
0
value 0.00398
scoring_system epss
scoring_elements 0.60632
published_at 2026-04-16T12:55:00Z
1
value 0.00398
scoring_system epss
scoring_elements 0.60627
published_at 2026-04-11T12:55:00Z
2
value 0.00398
scoring_system epss
scoring_elements 0.60612
published_at 2026-04-12T12:55:00Z
3
value 0.00398
scoring_system epss
scoring_elements 0.60591
published_at 2026-04-13T12:55:00Z
4
value 0.00432
scoring_system epss
scoring_elements 0.62608
published_at 2026-04-02T12:55:00Z
5
value 0.00432
scoring_system epss
scoring_elements 0.62656
published_at 2026-04-08T12:55:00Z
6
value 0.00432
scoring_system epss
scoring_elements 0.62672
published_at 2026-04-09T12:55:00Z
7
value 0.00432
scoring_system epss
scoring_elements 0.62606
published_at 2026-04-07T12:55:00Z
8
value 0.00432
scoring_system epss
scoring_elements 0.62641
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-46218
2
reference_url https://curl.se/docs/CVE-2023-46218.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-46218.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46218
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/2212193
reference_id
reference_type
scores
url https://hackerone.com/reports/2212193
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057646
reference_id 1057646
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057646
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2252030
reference_id 2252030
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2252030
8
reference_url https://security.gentoo.org/glsa/202409-20
reference_id GLSA-202409-20
reference_type
scores
url https://security.gentoo.org/glsa/202409-20
9
reference_url https://access.redhat.com/errata/RHSA-2024:0428
reference_id RHSA-2024:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0428
10
reference_url https://access.redhat.com/errata/RHSA-2024:0434
reference_id RHSA-2024:0434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0434
11
reference_url https://access.redhat.com/errata/RHSA-2024:0452
reference_id RHSA-2024:0452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0452
12
reference_url https://access.redhat.com/errata/RHSA-2024:0585
reference_id RHSA-2024:0585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0585
13
reference_url https://access.redhat.com/errata/RHSA-2024:1129
reference_id RHSA-2024:1129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1129
14
reference_url https://access.redhat.com/errata/RHSA-2024:1316
reference_id RHSA-2024:1316
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1316
15
reference_url https://access.redhat.com/errata/RHSA-2024:1317
reference_id RHSA-2024:1317
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1317
16
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1383
17
reference_url https://access.redhat.com/errata/RHSA-2024:1601
reference_id RHSA-2024:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1601
18
reference_url https://access.redhat.com/errata/RHSA-2024:2092
reference_id RHSA-2024:2092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2092
19
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
20
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2094
21
reference_url https://usn.ubuntu.com/6535-1/
reference_id USN-6535-1
reference_type
scores
url https://usn.ubuntu.com/6535-1/
22
reference_url https://usn.ubuntu.com/6641-1/
reference_id USN-6641-1
reference_type
scores
url https://usn.ubuntu.com/6641-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u11?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u11%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.5.0-1?distro=trixie
purl pkg:deb/debian/curl@8.5.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.5.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
7
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2023-46218
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qdcn-2u3v-b3cv
128
url VCID-qka4-jfdb-w3d5
vulnerability_id VCID-qka4-jfdb-w3d5
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which can allow remote attackers to cause Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3144.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3144.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3144
reference_id
reference_type
scores
0
value 0.01008
scoring_system epss
scoring_elements 0.7711
published_at 2026-04-16T12:55:00Z
1
value 0.01008
scoring_system epss
scoring_elements 0.77008
published_at 2026-04-01T12:55:00Z
2
value 0.01008
scoring_system epss
scoring_elements 0.77013
published_at 2026-04-02T12:55:00Z
3
value 0.01008
scoring_system epss
scoring_elements 0.77043
published_at 2026-04-04T12:55:00Z
4
value 0.01008
scoring_system epss
scoring_elements 0.77023
published_at 2026-04-07T12:55:00Z
5
value 0.01008
scoring_system epss
scoring_elements 0.77055
published_at 2026-04-08T12:55:00Z
6
value 0.01008
scoring_system epss
scoring_elements 0.77066
published_at 2026-04-09T12:55:00Z
7
value 0.01008
scoring_system epss
scoring_elements 0.77094
published_at 2026-04-11T12:55:00Z
8
value 0.01008
scoring_system epss
scoring_elements 0.77074
published_at 2026-04-12T12:55:00Z
9
value 0.01008
scoring_system epss
scoring_elements 0.77069
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3144
2
reference_url https://curl.se/docs/CVE-2015-3144.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2015-3144.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3144
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3144
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1213335
reference_id 1213335
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1213335
5
reference_url https://security.gentoo.org/glsa/201509-02
reference_id GLSA-201509-02
reference_type
scores
url https://security.gentoo.org/glsa/201509-02
6
reference_url https://usn.ubuntu.com/2591-1/
reference_id USN-2591-1
reference_type
scores
url https://usn.ubuntu.com/2591-1/
fixed_packages
0
url pkg:deb/debian/curl@7.42.0-1?distro=trixie
purl pkg:deb/debian/curl@7.42.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.42.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2015-3144
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qka4-jfdb-w3d5
129
url VCID-qpfa-s6sd-8yct
vulnerability_id VCID-qpfa-s6sd-8yct
summary curl: Windows OpenSSL engine code injection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5443.json
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5443.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-5443
reference_id
reference_type
scores
0
value 0.00953
scoring_system epss
scoring_elements 0.76346
published_at 2026-04-01T12:55:00Z
1
value 0.00953
scoring_system epss
scoring_elements 0.7635
published_at 2026-04-02T12:55:00Z
2
value 0.00953
scoring_system epss
scoring_elements 0.76379
published_at 2026-04-04T12:55:00Z
3
value 0.00953
scoring_system epss
scoring_elements 0.76359
published_at 2026-04-07T12:55:00Z
4
value 0.00953
scoring_system epss
scoring_elements 0.76392
published_at 2026-04-08T12:55:00Z
5
value 0.00953
scoring_system epss
scoring_elements 0.76405
published_at 2026-04-09T12:55:00Z
6
value 0.00953
scoring_system epss
scoring_elements 0.76431
published_at 2026-04-11T12:55:00Z
7
value 0.00953
scoring_system epss
scoring_elements 0.76409
published_at 2026-04-12T12:55:00Z
8
value 0.00953
scoring_system epss
scoring_elements 0.76404
published_at 2026-04-13T12:55:00Z
9
value 0.00953
scoring_system epss
scoring_elements 0.76444
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-5443
2
reference_url https://curl.se/docs/CVE-2019-5443.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2019-5443.html
3
reference_url https://hackerone.com/reports/608577
reference_id
reference_type
scores
url https://hackerone.com/reports/608577
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1772100
reference_id 1772100
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1772100
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2019-5443
risk_score 3.8
exploitability 0.5
weighted_severity 7.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qpfa-s6sd-8yct
130
url VCID-qpux-jh6k-8qhx
vulnerability_id VCID-qpux-jh6k-8qhx
summary curl: Curl missing SFTP host verification with wolfSSH backend
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10966.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10966.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-10966
reference_id
reference_type
scores
0
value 0.00018
scoring_system epss
scoring_elements 0.04624
published_at 2026-04-02T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05191
published_at 2026-04-16T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05467
published_at 2026-04-04T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05252
published_at 2026-04-07T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05288
published_at 2026-04-08T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05309
published_at 2026-04-09T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05274
published_at 2026-04-11T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.0526
published_at 2026-04-12T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05246
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-10966
2
reference_url https://curl.se/docs/CVE-2025-10966.html
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-10T20:26:03Z/
url https://curl.se/docs/CVE-2025-10966.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10966
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/3355218
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-10T20:26:03Z/
url https://hackerone.com/reports/3355218
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2413308
reference_id 2413308
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2413308
7
reference_url https://curl.se/docs/CVE-2025-10966.json
reference_id CVE-2025-10966.json
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-10T20:26:03Z/
url https://curl.se/docs/CVE-2025-10966.json
fixed_packages
0
url pkg:deb/debian/curl@8.17.0~rc2-1?distro=trixie
purl pkg:deb/debian/curl@8.17.0~rc2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.17.0~rc2-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2025-10966
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qpux-jh6k-8qhx
131
url VCID-r3ny-7kn7-ukaa
vulnerability_id VCID-r3ny-7kn7-ukaa
summary
An error in the X.509 certificate handling of cURL might enable remote
    attackers to conduct man-in-the-middle attacks.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2417.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2417.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2417
reference_id
reference_type
scores
0
value 0.0733
scoring_system epss
scoring_elements 0.91717
published_at 2026-04-16T12:55:00Z
1
value 0.0733
scoring_system epss
scoring_elements 0.91653
published_at 2026-04-01T12:55:00Z
2
value 0.0733
scoring_system epss
scoring_elements 0.91661
published_at 2026-04-02T12:55:00Z
3
value 0.0733
scoring_system epss
scoring_elements 0.91666
published_at 2026-04-04T12:55:00Z
4
value 0.0733
scoring_system epss
scoring_elements 0.91675
published_at 2026-04-07T12:55:00Z
5
value 0.0733
scoring_system epss
scoring_elements 0.91688
published_at 2026-04-08T12:55:00Z
6
value 0.0733
scoring_system epss
scoring_elements 0.91694
published_at 2026-04-09T12:55:00Z
7
value 0.0733
scoring_system epss
scoring_elements 0.91697
published_at 2026-04-11T12:55:00Z
8
value 0.0733
scoring_system epss
scoring_elements 0.917
published_at 2026-04-12T12:55:00Z
9
value 0.0733
scoring_system epss
scoring_elements 0.91696
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2417
2
reference_url https://curl.se/docs/CVE-2009-2417.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2009-2417.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=516181
reference_id 516181
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=516181
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=541991
reference_id 541991
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=541991
6
reference_url https://security.gentoo.org/glsa/200909-20
reference_id GLSA-200909-20
reference_type
scores
url https://security.gentoo.org/glsa/200909-20
7
reference_url https://access.redhat.com/errata/RHSA-2009:1209
reference_id RHSA-2009:1209
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1209
8
reference_url https://usn.ubuntu.com/1158-1/
reference_id USN-1158-1
reference_type
scores
url https://usn.ubuntu.com/1158-1/
9
reference_url https://usn.ubuntu.com/818-1/
reference_id USN-818-1
reference_type
scores
url https://usn.ubuntu.com/818-1/
fixed_packages
0
url pkg:deb/debian/curl@7.19.5-1.1?distro=trixie
purl pkg:deb/debian/curl@7.19.5-1.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.19.5-1.1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2009-2417
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r3ny-7kn7-ukaa
132
url VCID-r447-deb8-2ydj
vulnerability_id VCID-r447-deb8-2ydj
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which can allow remote attackers to cause Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3237.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3237.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3237
reference_id
reference_type
scores
0
value 0.05127
scoring_system epss
scoring_elements 0.89873
published_at 2026-04-16T12:55:00Z
1
value 0.05127
scoring_system epss
scoring_elements 0.89818
published_at 2026-04-01T12:55:00Z
2
value 0.05127
scoring_system epss
scoring_elements 0.89821
published_at 2026-04-02T12:55:00Z
3
value 0.05127
scoring_system epss
scoring_elements 0.89835
published_at 2026-04-04T12:55:00Z
4
value 0.05127
scoring_system epss
scoring_elements 0.89839
published_at 2026-04-07T12:55:00Z
5
value 0.05127
scoring_system epss
scoring_elements 0.89857
published_at 2026-04-08T12:55:00Z
6
value 0.05127
scoring_system epss
scoring_elements 0.89863
published_at 2026-04-09T12:55:00Z
7
value 0.05127
scoring_system epss
scoring_elements 0.89869
published_at 2026-04-11T12:55:00Z
8
value 0.05127
scoring_system epss
scoring_elements 0.89867
published_at 2026-04-12T12:55:00Z
9
value 0.05127
scoring_system epss
scoring_elements 0.8986
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3237
2
reference_url https://curl.se/docs/CVE-2015-3237.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2015-3237.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3237
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3237
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1233814
reference_id 1233814
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1233814
5
reference_url https://security.gentoo.org/glsa/201509-02
reference_id GLSA-201509-02
reference_type
scores
url https://security.gentoo.org/glsa/201509-02
fixed_packages
0
url pkg:deb/debian/curl@7.43.0-1?distro=trixie
purl pkg:deb/debian/curl@7.43.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.43.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2015-3237
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r447-deb8-2ydj
133
url VCID-r7bh-7wur-xffs
vulnerability_id VCID-r7bh-7wur-xffs
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27776.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27776.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27776
reference_id
reference_type
scores
0
value 0.00682
scoring_system epss
scoring_elements 0.71649
published_at 2026-04-16T12:55:00Z
1
value 0.00682
scoring_system epss
scoring_elements 0.71574
published_at 2026-04-02T12:55:00Z
2
value 0.00682
scoring_system epss
scoring_elements 0.71592
published_at 2026-04-04T12:55:00Z
3
value 0.00682
scoring_system epss
scoring_elements 0.71565
published_at 2026-04-07T12:55:00Z
4
value 0.00682
scoring_system epss
scoring_elements 0.71605
published_at 2026-04-08T12:55:00Z
5
value 0.00682
scoring_system epss
scoring_elements 0.71616
published_at 2026-04-09T12:55:00Z
6
value 0.00682
scoring_system epss
scoring_elements 0.71639
published_at 2026-04-11T12:55:00Z
7
value 0.00682
scoring_system epss
scoring_elements 0.71623
published_at 2026-04-12T12:55:00Z
8
value 0.00682
scoring_system epss
scoring_elements 0.71604
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27776
2
reference_url https://curl.se/docs/CVE-2022-27776.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-27776.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1547048
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/
url https://hackerone.com/reports/1547048
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010252
reference_id 1010252
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010252
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2078408
reference_id 2078408
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2078408
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/
reference_id 7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/
23
reference_url https://security.archlinux.org/AVG-2685
reference_id AVG-2685
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2685
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/
reference_id DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/
25
reference_url https://www.debian.org/security/2022/dsa-5197
reference_id dsa-5197
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/
url https://www.debian.org/security/2022/dsa-5197
26
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/
url https://security.gentoo.org/glsa/202212-01
27
reference_url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/
url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
28
reference_url https://security.netapp.com/advisory/ntap-20220609-0008/
reference_id ntap-20220609-0008
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/
url https://security.netapp.com/advisory/ntap-20220609-0008/
29
reference_url https://access.redhat.com/errata/RHSA-2022:5245
reference_id RHSA-2022:5245
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5245
30
reference_url https://access.redhat.com/errata/RHSA-2022:5313
reference_id RHSA-2022:5313
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5313
31
reference_url https://usn.ubuntu.com/5397-1/
reference_id USN-5397-1
reference_type
scores
url https://usn.ubuntu.com/5397-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.83.0-1?distro=trixie
purl pkg:deb/debian/curl@7.83.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.0-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2022-27776
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r7bh-7wur-xffs
134
url VCID-rg54-svzj-x7f9
vulnerability_id VCID-rg54-svzj-x7f9
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35260.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35260.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-35260
reference_id
reference_type
scores
0
value 0.00182
scoring_system epss
scoring_elements 0.3993
published_at 2026-04-02T12:55:00Z
1
value 0.00182
scoring_system epss
scoring_elements 0.39957
published_at 2026-04-04T12:55:00Z
2
value 0.00194
scoring_system epss
scoring_elements 0.41282
published_at 2026-04-07T12:55:00Z
3
value 0.00194
scoring_system epss
scoring_elements 0.41341
published_at 2026-04-09T12:55:00Z
4
value 0.00194
scoring_system epss
scoring_elements 0.41333
published_at 2026-04-08T12:55:00Z
5
value 0.00194
scoring_system epss
scoring_elements 0.41362
published_at 2026-04-11T12:55:00Z
6
value 0.00253
scoring_system epss
scoring_elements 0.48694
published_at 2026-04-16T12:55:00Z
7
value 0.00253
scoring_system epss
scoring_elements 0.48632
published_at 2026-04-12T12:55:00Z
8
value 0.00253
scoring_system epss
scoring_elements 0.48645
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-35260
2
reference_url https://curl.se/docs/CVE-2022-35260.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-35260.html
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://hackerone.com/reports/1721098
reference_id
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/
url https://hackerone.com/reports/1721098
5
reference_url http://seclists.org/fulldisclosure/2023/Jan/19
reference_id 19
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/
url http://seclists.org/fulldisclosure/2023/Jan/19
6
reference_url http://seclists.org/fulldisclosure/2023/Jan/20
reference_id 20
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/
url http://seclists.org/fulldisclosure/2023/Jan/20
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2135412
reference_id 2135412
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2135412
8
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/
url https://security.gentoo.org/glsa/202212-01
9
reference_url https://support.apple.com/kb/HT213604
reference_id HT213604
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/
url https://support.apple.com/kb/HT213604
10
reference_url https://support.apple.com/kb/HT213605
reference_id HT213605
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/
url https://support.apple.com/kb/HT213605
11
reference_url https://security.netapp.com/advisory/ntap-20230110-0006/
reference_id ntap-20230110-0006
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/
url https://security.netapp.com/advisory/ntap-20230110-0006/
12
reference_url https://usn.ubuntu.com/5702-1/
reference_id USN-5702-1
reference_type
scores
url https://usn.ubuntu.com/5702-1/
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.86.0-1?distro=trixie
purl pkg:deb/debian/curl@7.86.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.86.0-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2022-35260
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rg54-svzj-x7f9
135
url VCID-rhxh-77pj-1bfy
vulnerability_id VCID-rhxh-77pj-1bfy
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27780.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27780.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27780
reference_id
reference_type
scores
0
value 0.00158
scoring_system epss
scoring_elements 0.36677
published_at 2026-04-16T12:55:00Z
1
value 0.00158
scoring_system epss
scoring_elements 0.36748
published_at 2026-04-02T12:55:00Z
2
value 0.00158
scoring_system epss
scoring_elements 0.36779
published_at 2026-04-04T12:55:00Z
3
value 0.00158
scoring_system epss
scoring_elements 0.36615
published_at 2026-04-07T12:55:00Z
4
value 0.00158
scoring_system epss
scoring_elements 0.36667
published_at 2026-04-08T12:55:00Z
5
value 0.00158
scoring_system epss
scoring_elements 0.36683
published_at 2026-04-09T12:55:00Z
6
value 0.00158
scoring_system epss
scoring_elements 0.36692
published_at 2026-04-11T12:55:00Z
7
value 0.00158
scoring_system epss
scoring_elements 0.36658
published_at 2026-04-12T12:55:00Z
8
value 0.00158
scoring_system epss
scoring_elements 0.36632
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27780
2
reference_url https://curl.se/docs/CVE-2022-27780.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-27780.html
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://hackerone.com/reports/1553841
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T20:10:43Z/
url https://hackerone.com/reports/1553841
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082203
reference_id 2082203
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082203
6
reference_url https://security.archlinux.org/AVG-2706
reference_id AVG-2706
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2706
7
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T20:10:43Z/
url https://security.gentoo.org/glsa/202212-01
8
reference_url https://security.netapp.com/advisory/ntap-20220609-0009/
reference_id ntap-20220609-0009
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T20:10:43Z/
url https://security.netapp.com/advisory/ntap-20220609-0009/
9
reference_url https://usn.ubuntu.com/5412-1/
reference_id USN-5412-1
reference_type
scores
url https://usn.ubuntu.com/5412-1/
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.83.1-1?distro=trixie
purl pkg:deb/debian/curl@7.83.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.1-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2022-27780
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rhxh-77pj-1bfy
136
url VCID-rmez-cwu2-2ya7
vulnerability_id VCID-rmez-cwu2-2ya7
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in information disclosure or data loss.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8284.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8284.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8284
reference_id
reference_type
scores
0
value 0.00104
scoring_system epss
scoring_elements 0.28391
published_at 2026-04-01T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.28321
published_at 2026-04-16T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28411
published_at 2026-04-11T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28368
published_at 2026-04-12T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.2831
published_at 2026-04-13T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28466
published_at 2026-04-02T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28508
published_at 2026-04-04T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28299
published_at 2026-04-07T12:55:00Z
8
value 0.00104
scoring_system epss
scoring_elements 0.28364
published_at 2026-04-08T12:55:00Z
9
value 0.00104
scoring_system epss
scoring_elements 0.28408
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8284
2
reference_url https://curl.se/docs/CVE-2020-8284.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2020-8284.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://hackerone.com/reports/1040166
reference_id
reference_type
scores
url https://hackerone.com/reports/1040166
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1902667
reference_id 1902667
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1902667
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977163
reference_id 977163
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977163
15
reference_url https://security.archlinux.org/AVG-1337
reference_id AVG-1337
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1337
16
reference_url https://security.gentoo.org/glsa/202012-14
reference_id GLSA-202012-14
reference_type
scores
url https://security.gentoo.org/glsa/202012-14
17
reference_url https://access.redhat.com/errata/RHSA-2021:1610
reference_id RHSA-2021:1610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1610
18
reference_url https://access.redhat.com/errata/RHSA-2021:2471
reference_id RHSA-2021:2471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2471
19
reference_url https://access.redhat.com/errata/RHSA-2021:2472
reference_id RHSA-2021:2472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2472
20
reference_url https://usn.ubuntu.com/4665-1/
reference_id USN-4665-1
reference_type
scores
url https://usn.ubuntu.com/4665-1/
21
reference_url https://usn.ubuntu.com/4665-2/
reference_id USN-4665-2
reference_type
scores
url https://usn.ubuntu.com/4665-2/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2020-8284
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rmez-cwu2-2ya7
137
url VCID-s73y-y7v7-43cm
vulnerability_id VCID-s73y-y7v7-43cm
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28322.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28322.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28322
reference_id
reference_type
scores
0
value 0.00631
scoring_system epss
scoring_elements 0.70331
published_at 2026-04-16T12:55:00Z
1
value 0.00631
scoring_system epss
scoring_elements 0.70238
published_at 2026-04-02T12:55:00Z
2
value 0.00631
scoring_system epss
scoring_elements 0.70255
published_at 2026-04-04T12:55:00Z
3
value 0.00631
scoring_system epss
scoring_elements 0.70232
published_at 2026-04-07T12:55:00Z
4
value 0.00631
scoring_system epss
scoring_elements 0.70278
published_at 2026-04-08T12:55:00Z
5
value 0.00631
scoring_system epss
scoring_elements 0.70294
published_at 2026-04-09T12:55:00Z
6
value 0.00631
scoring_system epss
scoring_elements 0.70317
published_at 2026-04-11T12:55:00Z
7
value 0.00631
scoring_system epss
scoring_elements 0.70302
published_at 2026-04-12T12:55:00Z
8
value 0.00631
scoring_system epss
scoring_elements 0.70289
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28322
2
reference_url https://curl.se/docs/CVE-2023-28322.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-28322.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28322
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1954658
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://hackerone.com/reports/1954658
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239
reference_id 1036239
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2196793
reference_id 2196793
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2196793
8
reference_url http://seclists.org/fulldisclosure/2023/Jul/47
reference_id 47
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url http://seclists.org/fulldisclosure/2023/Jul/47
9
reference_url http://seclists.org/fulldisclosure/2023/Jul/48
reference_id 48
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url http://seclists.org/fulldisclosure/2023/Jul/48
10
reference_url http://seclists.org/fulldisclosure/2023/Jul/52
reference_id 52
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url http://seclists.org/fulldisclosure/2023/Jul/52
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
reference_id F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
12
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://security.gentoo.org/glsa/202310-12
13
reference_url https://support.apple.com/kb/HT213843
reference_id HT213843
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://support.apple.com/kb/HT213843
14
reference_url https://support.apple.com/kb/HT213844
reference_id HT213844
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://support.apple.com/kb/HT213844
15
reference_url https://support.apple.com/kb/HT213845
reference_id HT213845
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://support.apple.com/kb/HT213845
16
reference_url https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html
17
reference_url https://security.netapp.com/advisory/ntap-20230609-0009/
reference_id ntap-20230609-0009
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://security.netapp.com/advisory/ntap-20230609-0009/
18
reference_url https://access.redhat.com/errata/RHSA-2023:4354
reference_id RHSA-2023:4354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4354
19
reference_url https://access.redhat.com/errata/RHSA-2023:4628
reference_id RHSA-2023:4628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4628
20
reference_url https://access.redhat.com/errata/RHSA-2023:4629
reference_id RHSA-2023:4629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4629
21
reference_url https://access.redhat.com/errata/RHSA-2023:5598
reference_id RHSA-2023:5598
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5598
22
reference_url https://access.redhat.com/errata/RHSA-2024:0428
reference_id RHSA-2024:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0428
23
reference_url https://access.redhat.com/errata/RHSA-2024:0585
reference_id RHSA-2024:0585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0585
24
reference_url https://access.redhat.com/errata/RHSA-2024:1601
reference_id RHSA-2024:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1601
25
reference_url https://access.redhat.com/errata/RHSA-2024:2092
reference_id RHSA-2024:2092
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2092
26
reference_url https://access.redhat.com/errata/RHSA-2024:2093
reference_id RHSA-2024:2093
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2093
27
reference_url https://usn.ubuntu.com/6237-1/
reference_id USN-6237-1
reference_type
scores
url https://usn.ubuntu.com/6237-1/
28
reference_url https://usn.ubuntu.com/6237-3/
reference_id USN-6237-3
reference_type
scores
url https://usn.ubuntu.com/6237-3/
29
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
reference_id Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u9?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u9%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2023-28322
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s73y-y7v7-43cm
138
url VCID-sh5a-fmna-wffr
vulnerability_id VCID-sh5a-fmna-wffr
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22946
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.23143
published_at 2026-04-01T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.2322
published_at 2026-04-16T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23322
published_at 2026-04-02T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23365
published_at 2026-04-04T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23154
published_at 2026-04-07T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23227
published_at 2026-04-08T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23277
published_at 2026-04-09T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23299
published_at 2026-04-11T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23261
published_at 2026-04-12T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23204
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22946
2
reference_url https://curl.se/docs/CVE-2021-22946.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22946.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1334111
reference_id
reference_type
scores
url https://hackerone.com/reports/1334111
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017589
reference_id 1017589
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017589
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2003175
reference_id 2003175
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2003175
22
reference_url https://security.archlinux.org/AVG-2384
reference_id AVG-2384
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2384
23
reference_url https://security.archlinux.org/AVG-2385
reference_id AVG-2385
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2385
24
reference_url https://security.archlinux.org/AVG-2386
reference_id AVG-2386
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2386
25
reference_url https://security.archlinux.org/AVG-2387
reference_id AVG-2387
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2387
26
reference_url https://security.archlinux.org/AVG-2388
reference_id AVG-2388
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2388
27
reference_url https://security.archlinux.org/AVG-2389
reference_id AVG-2389
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2389
28
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
url https://security.gentoo.org/glsa/202212-01
29
reference_url https://access.redhat.com/errata/RHSA-2021:4059
reference_id RHSA-2021:4059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4059
30
reference_url https://access.redhat.com/errata/RHSA-2022:0635
reference_id RHSA-2022:0635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0635
31
reference_url https://access.redhat.com/errata/RHSA-2022:1354
reference_id RHSA-2022:1354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1354
32
reference_url https://usn.ubuntu.com/5079-1/
reference_id USN-5079-1
reference_type
scores
url https://usn.ubuntu.com/5079-1/
33
reference_url https://usn.ubuntu.com/5079-2/
reference_id USN-5079-2
reference_type
scores
url https://usn.ubuntu.com/5079-2/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.79.1-1?distro=trixie
purl pkg:deb/debian/curl@7.79.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.79.1-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2021-22946
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sh5a-fmna-wffr
139
url VCID-sknq-8mm1-6qfe
vulnerability_id VCID-sknq-8mm1-6qfe
summary security update
references
0
reference_url http://curl.haxx.se/docs/adv_20140910A.html
reference_id
reference_type
scores
url http://curl.haxx.se/docs/adv_20140910A.html
1
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
2
reference_url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2015-1254.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1254.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3613.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3613.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3613
reference_id
reference_type
scores
0
value 0.0182
scoring_system epss
scoring_elements 0.82903
published_at 2026-04-16T12:55:00Z
1
value 0.0182
scoring_system epss
scoring_elements 0.82864
published_at 2026-04-13T12:55:00Z
2
value 0.0182
scoring_system epss
scoring_elements 0.82801
published_at 2026-04-01T12:55:00Z
3
value 0.0182
scoring_system epss
scoring_elements 0.82817
published_at 2026-04-02T12:55:00Z
4
value 0.0182
scoring_system epss
scoring_elements 0.8283
published_at 2026-04-04T12:55:00Z
5
value 0.0182
scoring_system epss
scoring_elements 0.82826
published_at 2026-04-07T12:55:00Z
6
value 0.0182
scoring_system epss
scoring_elements 0.82851
published_at 2026-04-08T12:55:00Z
7
value 0.0182
scoring_system epss
scoring_elements 0.82858
published_at 2026-04-09T12:55:00Z
8
value 0.0182
scoring_system epss
scoring_elements 0.82874
published_at 2026-04-11T12:55:00Z
9
value 0.0182
scoring_system epss
scoring_elements 0.82868
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3613
7
reference_url https://curl.se/docs/CVE-2014-3613.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2014-3613.html
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613
9
reference_url https://support.apple.com/kb/HT205031
reference_id
reference_type
scores
url https://support.apple.com/kb/HT205031
10
reference_url http://www.debian.org/security/2014/dsa-3022
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3022
11
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
12
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
13
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
14
reference_url http://www.securityfocus.com/bid/69748
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/69748
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1136154
reference_id 1136154
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1136154
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3613
reference_id CVE-2014-3613
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-3613
34
reference_url https://access.redhat.com/errata/RHSA-2015:1254
reference_id RHSA-2015:1254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1254
35
reference_url https://access.redhat.com/errata/RHSA-2015:2159
reference_id RHSA-2015:2159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2159
36
reference_url https://usn.ubuntu.com/2346-1/
reference_id USN-2346-1
reference_type
scores
url https://usn.ubuntu.com/2346-1/
fixed_packages
0
url pkg:deb/debian/curl@7.38.0-1?distro=trixie
purl pkg:deb/debian/curl@7.38.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.38.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2014-3613
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sknq-8mm1-6qfe
140
url VCID-snaz-pg1h-8kew
vulnerability_id VCID-snaz-pg1h-8kew
summary cURL before 7.47.0 on Windows allows attackers to write to arbitrary files in the current working directory on a different drive via a colon in a remote file name.
references
0
reference_url http://curl.haxx.se/docs/adv_20160127B.html
reference_id
reference_type
scores
url http://curl.haxx.se/docs/adv_20160127B.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0754
reference_id
reference_type
scores
0
value 0.00351
scoring_system epss
scoring_elements 0.57561
published_at 2026-04-16T12:55:00Z
1
value 0.00351
scoring_system epss
scoring_elements 0.57555
published_at 2026-04-12T12:55:00Z
2
value 0.00351
scoring_system epss
scoring_elements 0.57533
published_at 2026-04-13T12:55:00Z
3
value 0.00351
scoring_system epss
scoring_elements 0.57423
published_at 2026-04-01T12:55:00Z
4
value 0.00351
scoring_system epss
scoring_elements 0.57507
published_at 2026-04-02T12:55:00Z
5
value 0.00351
scoring_system epss
scoring_elements 0.57528
published_at 2026-04-04T12:55:00Z
6
value 0.00351
scoring_system epss
scoring_elements 0.57504
published_at 2026-04-07T12:55:00Z
7
value 0.00351
scoring_system epss
scoring_elements 0.57556
published_at 2026-04-08T12:55:00Z
8
value 0.00351
scoring_system epss
scoring_elements 0.5756
published_at 2026-04-09T12:55:00Z
9
value 0.00351
scoring_system epss
scoring_elements 0.57575
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0754
2
reference_url https://curl.se/docs/CVE-2016-0754.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-0754.html
3
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0754
reference_id CVE-2016-0754
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-0754
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-0754
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-snaz-pg1h-8kew
141
url VCID-syz5-5y6f-s7er
vulnerability_id VCID-syz5-5y6f-s7er
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27534.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27534.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27534
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.19882
published_at 2026-04-16T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.19963
published_at 2026-04-12T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.19904
published_at 2026-04-13T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.20068
published_at 2026-04-02T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.20126
published_at 2026-04-04T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.19854
published_at 2026-04-07T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.19933
published_at 2026-04-08T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.19988
published_at 2026-04-09T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.20007
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27534
2
reference_url https://curl.se/docs/CVE-2023-27534.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2023-27534.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27534
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1892351
reference_id
reference_type
scores
url https://hackerone.com/reports/1892351
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2179069
reference_id 2179069
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2179069
7
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
url https://security.gentoo.org/glsa/202310-12
8
reference_url https://access.redhat.com/errata/RHSA-2023:3354
reference_id RHSA-2023:3354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3354
9
reference_url https://access.redhat.com/errata/RHSA-2023:3355
reference_id RHSA-2023:3355
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3355
10
reference_url https://access.redhat.com/errata/RHSA-2023:6679
reference_id RHSA-2023:6679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6679
11
reference_url https://usn.ubuntu.com/5964-1/
reference_id USN-5964-1
reference_type
scores
url https://usn.ubuntu.com/5964-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u8?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u8%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-7?distro=trixie
purl pkg:deb/debian/curl@7.88.1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-7%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2023-27534
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-syz5-5y6f-s7er
142
url VCID-t1fk-cbsx-j3gh
vulnerability_id VCID-t1fk-cbsx-j3gh
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32205.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32205.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32205
reference_id
reference_type
scores
0
value 0.02588
scoring_system epss
scoring_elements 0.85604
published_at 2026-04-16T12:55:00Z
1
value 0.02588
scoring_system epss
scoring_elements 0.85522
published_at 2026-04-02T12:55:00Z
2
value 0.02588
scoring_system epss
scoring_elements 0.85539
published_at 2026-04-04T12:55:00Z
3
value 0.02588
scoring_system epss
scoring_elements 0.85544
published_at 2026-04-07T12:55:00Z
4
value 0.02588
scoring_system epss
scoring_elements 0.85564
published_at 2026-04-08T12:55:00Z
5
value 0.02588
scoring_system epss
scoring_elements 0.85575
published_at 2026-04-09T12:55:00Z
6
value 0.02588
scoring_system epss
scoring_elements 0.85589
published_at 2026-04-11T12:55:00Z
7
value 0.02588
scoring_system epss
scoring_elements 0.85586
published_at 2026-04-12T12:55:00Z
8
value 0.02588
scoring_system epss
scoring_elements 0.85581
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32205
2
reference_url https://curl.se/docs/CVE-2022-32205.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-32205.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1569946
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/
url https://hackerone.com/reports/1569946
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2099296
reference_id 2099296
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2099296
21
reference_url http://seclists.org/fulldisclosure/2022/Oct/28
reference_id 28
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/
url http://seclists.org/fulldisclosure/2022/Oct/28
22
reference_url http://seclists.org/fulldisclosure/2022/Oct/41
reference_id 41
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/
url http://seclists.org/fulldisclosure/2022/Oct/41
23
reference_url https://security.archlinux.org/AVG-2771
reference_id AVG-2771
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2771
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
reference_id BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
25
reference_url https://www.debian.org/security/2022/dsa-5197
reference_id dsa-5197
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/
url https://www.debian.org/security/2022/dsa-5197
26
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/
url https://security.gentoo.org/glsa/202212-01
27
reference_url https://support.apple.com/kb/HT213488
reference_id HT213488
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/
url https://support.apple.com/kb/HT213488
28
reference_url https://security.netapp.com/advisory/ntap-20220915-0003/
reference_id ntap-20220915-0003
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/
url https://security.netapp.com/advisory/ntap-20220915-0003/
29
reference_url https://usn.ubuntu.com/5495-1/
reference_id USN-5495-1
reference_type
scores
url https://usn.ubuntu.com/5495-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.84.0-1?distro=trixie
purl pkg:deb/debian/curl@7.84.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.84.0-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2022-32205
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t1fk-cbsx-j3gh
143
url VCID-t4gn-9fw8-gkc3
vulnerability_id VCID-t4gn-9fw8-gkc3
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22947
reference_id
reference_type
scores
0
value 0.00253
scoring_system epss
scoring_elements 0.486
published_at 2026-04-01T12:55:00Z
1
value 0.00253
scoring_system epss
scoring_elements 0.48718
published_at 2026-04-16T12:55:00Z
2
value 0.00253
scoring_system epss
scoring_elements 0.48641
published_at 2026-04-02T12:55:00Z
3
value 0.00253
scoring_system epss
scoring_elements 0.48662
published_at 2026-04-04T12:55:00Z
4
value 0.00253
scoring_system epss
scoring_elements 0.48614
published_at 2026-04-07T12:55:00Z
5
value 0.00253
scoring_system epss
scoring_elements 0.48668
published_at 2026-04-08T12:55:00Z
6
value 0.00253
scoring_system epss
scoring_elements 0.48665
published_at 2026-04-09T12:55:00Z
7
value 0.00253
scoring_system epss
scoring_elements 0.48683
published_at 2026-04-11T12:55:00Z
8
value 0.00253
scoring_system epss
scoring_elements 0.48657
published_at 2026-04-12T12:55:00Z
9
value 0.00253
scoring_system epss
scoring_elements 0.48669
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22947
2
reference_url https://curl.se/docs/CVE-2021-22947.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22947.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1334763
reference_id
reference_type
scores
url https://hackerone.com/reports/1334763
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2003191
reference_id 2003191
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2003191
21
reference_url https://security.archlinux.org/AVG-2384
reference_id AVG-2384
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2384
22
reference_url https://security.archlinux.org/AVG-2385
reference_id AVG-2385
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2385
23
reference_url https://security.archlinux.org/AVG-2386
reference_id AVG-2386
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2386
24
reference_url https://security.archlinux.org/AVG-2387
reference_id AVG-2387
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2387
25
reference_url https://security.archlinux.org/AVG-2388
reference_id AVG-2388
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2388
26
reference_url https://security.archlinux.org/AVG-2389
reference_id AVG-2389
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2389
27
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
url https://security.gentoo.org/glsa/202212-01
28
reference_url https://access.redhat.com/errata/RHSA-2021:4059
reference_id RHSA-2021:4059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4059
29
reference_url https://access.redhat.com/errata/RHSA-2022:0635
reference_id RHSA-2022:0635
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0635
30
reference_url https://access.redhat.com/errata/RHSA-2022:1354
reference_id RHSA-2022:1354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1354
31
reference_url https://usn.ubuntu.com/5079-1/
reference_id USN-5079-1
reference_type
scores
url https://usn.ubuntu.com/5079-1/
32
reference_url https://usn.ubuntu.com/5079-2/
reference_id USN-5079-2
reference_type
scores
url https://usn.ubuntu.com/5079-2/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.79.1-1?distro=trixie
purl pkg:deb/debian/curl@7.79.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.79.1-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2021-22947
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t4gn-9fw8-gkc3
144
url VCID-t753-w1ha-kqaz
vulnerability_id VCID-t753-w1ha-kqaz
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8151.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8151.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8151
reference_id
reference_type
scores
0
value 0.00424
scoring_system epss
scoring_elements 0.62234
published_at 2026-04-16T12:55:00Z
1
value 0.00424
scoring_system epss
scoring_elements 0.62074
published_at 2026-04-01T12:55:00Z
2
value 0.00424
scoring_system epss
scoring_elements 0.62134
published_at 2026-04-07T12:55:00Z
3
value 0.00424
scoring_system epss
scoring_elements 0.62166
published_at 2026-04-04T12:55:00Z
4
value 0.00424
scoring_system epss
scoring_elements 0.62184
published_at 2026-04-08T12:55:00Z
5
value 0.00424
scoring_system epss
scoring_elements 0.62202
published_at 2026-04-09T12:55:00Z
6
value 0.00424
scoring_system epss
scoring_elements 0.6222
published_at 2026-04-11T12:55:00Z
7
value 0.00424
scoring_system epss
scoring_elements 0.6221
published_at 2026-04-12T12:55:00Z
8
value 0.00424
scoring_system epss
scoring_elements 0.62189
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8151
2
reference_url https://curl.se/docs/CVE-2014-8151.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2014-8151.html
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1178698
reference_id 1178698
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1178698
4
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2014-8151
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t753-w1ha-kqaz
145
url VCID-t8t6-9wa3-aub7
vulnerability_id VCID-t8t6-9wa3-aub7
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27775.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27775.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27775
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.35947
published_at 2026-04-16T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.3597
published_at 2026-04-11T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.35931
published_at 2026-04-12T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.35907
published_at 2026-04-13T12:55:00Z
4
value 0.00152
scoring_system epss
scoring_elements 0.36026
published_at 2026-04-02T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.36057
published_at 2026-04-04T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.3589
published_at 2026-04-07T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.3594
published_at 2026-04-08T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.35964
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27775
2
reference_url https://curl.se/docs/CVE-2022-27775.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-27775.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1546268
reference_id
reference_type
scores
url https://hackerone.com/reports/1546268
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010253
reference_id 1010253
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010253
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2078388
reference_id 2078388
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2078388
22
reference_url https://security.archlinux.org/AVG-2685
reference_id AVG-2685
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2685
23
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
url https://security.gentoo.org/glsa/202212-01
24
reference_url https://access.redhat.com/errata/RHSA-2022:8299
reference_id RHSA-2022:8299
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8299
25
reference_url https://usn.ubuntu.com/5397-1/
reference_id USN-5397-1
reference_type
scores
url https://usn.ubuntu.com/5397-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.83.0-1?distro=trixie
purl pkg:deb/debian/curl@7.83.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.0-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2022-27775
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t8t6-9wa3-aub7
146
url VCID-t9p4-2x7v-yfaq
vulnerability_id VCID-t9p4-2x7v-yfaq
summary
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0167
reference_id
reference_type
scores
0
value 0.00331
scoring_system epss
scoring_elements 0.56103
published_at 2026-04-09T12:55:00Z
1
value 0.00331
scoring_system epss
scoring_elements 0.56114
published_at 2026-04-11T12:55:00Z
2
value 0.00331
scoring_system epss
scoring_elements 0.56109
published_at 2026-04-16T12:55:00Z
3
value 0.00331
scoring_system epss
scoring_elements 0.56074
published_at 2026-04-13T12:55:00Z
4
value 0.00331
scoring_system epss
scoring_elements 0.56091
published_at 2026-04-12T12:55:00Z
5
value 0.00341
scoring_system epss
scoring_elements 0.56786
published_at 2026-04-07T12:55:00Z
6
value 0.00341
scoring_system epss
scoring_elements 0.56789
published_at 2026-04-02T12:55:00Z
7
value 0.00341
scoring_system epss
scoring_elements 0.5681
published_at 2026-04-04T12:55:00Z
8
value 0.00341
scoring_system epss
scoring_elements 0.56838
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0167
1
reference_url https://curl.se/docs/CVE-2025-0167.html
reference_id
reference_type
scores
0
value 3.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-05T15:52:41Z/
url https://curl.se/docs/CVE-2025-0167.html
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://hackerone.com/reports/2917232
reference_id
reference_type
scores
0
value 3.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-05T15:52:41Z/
url https://hackerone.com/reports/2917232
4
reference_url https://curl.se/docs/CVE-2025-0167.json
reference_id CVE-2025-0167.json
reference_type
scores
0
value 3.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-05T15:52:41Z/
url https://curl.se/docs/CVE-2025-0167.json
5
reference_url https://usn.ubuntu.com/8084-1/
reference_id USN-8084-1
reference_type
scores
url https://usn.ubuntu.com/8084-1/
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u11?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u11?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u11%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.12.0%2Bgit20250209.89ed161%2Bds-1?distro=trixie
purl pkg:deb/debian/curl@8.12.0%2Bgit20250209.89ed161%2Bds-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.12.0%252Bgit20250209.89ed161%252Bds-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
7
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2025-0167
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t9p4-2x7v-yfaq
147
url VCID-tcqe-7skm-b3fz
vulnerability_id VCID-tcqe-7skm-b3fz
summary
Out-of-bounds Write
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy
handshake.

When curl is asked to pass along the host name to the SOCKS5 proxy to allow
that to resolve the address instead of it getting done by curl itself, the
maximum length that host name can be is 255 bytes.

If the host name is detected to be longer, curl switches to local name
resolving and instead passes on the resolved address only. Due to this bug,
the local variable that means "let the host resolve the name" could get the
wrong value during a slow SOCKS5 handshake, and contrary to the intention,
copy the too long host name to the target buffer instead of copying just the
resolved address there.

The target buffer being a heap based buffer, and the host name coming from the
URL that curl has been told to operate with.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38545.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38545.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38545
reference_id
reference_type
scores
0
value 0.2625
scoring_system epss
scoring_elements 0.96312
published_at 2026-04-16T12:55:00Z
1
value 0.2625
scoring_system epss
scoring_elements 0.96278
published_at 2026-04-04T12:55:00Z
2
value 0.2625
scoring_system epss
scoring_elements 0.96283
published_at 2026-04-07T12:55:00Z
3
value 0.2625
scoring_system epss
scoring_elements 0.96292
published_at 2026-04-08T12:55:00Z
4
value 0.2625
scoring_system epss
scoring_elements 0.96295
published_at 2026-04-09T12:55:00Z
5
value 0.2625
scoring_system epss
scoring_elements 0.963
published_at 2026-04-12T12:55:00Z
6
value 0.2625
scoring_system epss
scoring_elements 0.96303
published_at 2026-04-13T12:55:00Z
7
value 0.26747
scoring_system epss
scoring_elements 0.96315
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38545
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/2187833
reference_id
reference_type
scores
url https://hackerone.com/reports/2187833
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241933
reference_id 2241933
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241933
7
reference_url http://seclists.org/fulldisclosure/2024/Jan/34
reference_id 34
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/
url http://seclists.org/fulldisclosure/2024/Jan/34
8
reference_url http://seclists.org/fulldisclosure/2024/Jan/37
reference_id 37
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/
url http://seclists.org/fulldisclosure/2024/Jan/37
9
reference_url http://seclists.org/fulldisclosure/2024/Jan/38
reference_id 38
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/
url http://seclists.org/fulldisclosure/2024/Jan/38
10
reference_url https://security.archlinux.org/AVG-2845
reference_id AVG-2845
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2845
11
reference_url https://security.archlinux.org/AVG-2846
reference_id AVG-2846
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2846
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-38545
reference_id CVE-2023-38545
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-38545
13
reference_url https://curl.se/docs/CVE-2023-38545.html
reference_id CVE-2023-38545.HTML
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value High
scoring_system cvssv3.1
scoring_elements
2
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/
url https://curl.se/docs/CVE-2023-38545.html
14
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
url https://security.gentoo.org/glsa/202310-12
15
reference_url https://www.secpod.com/blog/high-severity-heap-buffer-overflow-vulnerability/
reference_id high-severity-heap-buffer-overflow-vulnerability
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/
url https://www.secpod.com/blog/high-severity-heap-buffer-overflow-vulnerability/
16
reference_url https://support.apple.com/kb/HT214036
reference_id HT214036
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/
url https://support.apple.com/kb/HT214036
17
reference_url https://support.apple.com/kb/HT214057
reference_id HT214057
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/
url https://support.apple.com/kb/HT214057
18
reference_url https://support.apple.com/kb/HT214058
reference_id HT214058
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/
url https://support.apple.com/kb/HT214058
19
reference_url https://support.apple.com/kb/HT214063
reference_id HT214063
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/
url https://support.apple.com/kb/HT214063
20
reference_url https://security.netapp.com/advisory/ntap-20231027-0009/
reference_id ntap-20231027-0009
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/
url https://security.netapp.com/advisory/ntap-20231027-0009/
21
reference_url https://security.netapp.com/advisory/ntap-20240201-0005/
reference_id ntap-20240201-0005
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/
url https://security.netapp.com/advisory/ntap-20240201-0005/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/
reference_id OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/
23
reference_url https://access.redhat.com/errata/RHSA-2023:5700
reference_id RHSA-2023:5700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5700
24
reference_url https://access.redhat.com/errata/RHSA-2023:5763
reference_id RHSA-2023:5763
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5763
25
reference_url https://access.redhat.com/errata/RHSA-2023:6745
reference_id RHSA-2023:6745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6745
26
reference_url https://access.redhat.com/errata/RHSA-2023:7625
reference_id RHSA-2023:7625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7625
27
reference_url https://access.redhat.com/errata/RHSA-2023:7626
reference_id RHSA-2023:7626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7626
28
reference_url https://access.redhat.com/errata/RHSA-2024:0797
reference_id RHSA-2024:0797
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0797
29
reference_url https://access.redhat.com/errata/RHSA-2024:2011
reference_id RHSA-2024:2011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2011
30
reference_url https://usn.ubuntu.com/6429-1/
reference_id USN-6429-1
reference_type
scores
url https://usn.ubuntu.com/6429-1/
31
reference_url https://usn.ubuntu.com/6429-3/
reference_id USN-6429-3
reference_type
scores
url https://usn.ubuntu.com/6429-3/
32
reference_url https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868
reference_id viewtopic.php?f=8&t=8868
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/
url https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u10?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u10%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.3.0-3?distro=trixie
purl pkg:deb/debian/curl@8.3.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.3.0-3%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
7
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2023-38545
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tcqe-7skm-b3fz
148
url VCID-tha5-fv3w-sub6
vulnerability_id VCID-tha5-fv3w-sub6
summary Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2004.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2004.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2004
reference_id
reference_type
scores
0
value 0.00838
scoring_system epss
scoring_elements 0.74722
published_at 2026-04-16T12:55:00Z
1
value 0.00838
scoring_system epss
scoring_elements 0.74642
published_at 2026-04-02T12:55:00Z
2
value 0.00838
scoring_system epss
scoring_elements 0.74669
published_at 2026-04-04T12:55:00Z
3
value 0.00838
scoring_system epss
scoring_elements 0.74644
published_at 2026-04-07T12:55:00Z
4
value 0.00838
scoring_system epss
scoring_elements 0.74675
published_at 2026-04-08T12:55:00Z
5
value 0.00838
scoring_system epss
scoring_elements 0.7469
published_at 2026-04-09T12:55:00Z
6
value 0.00838
scoring_system epss
scoring_elements 0.74713
published_at 2026-04-11T12:55:00Z
7
value 0.00838
scoring_system epss
scoring_elements 0.74693
published_at 2026-04-12T12:55:00Z
8
value 0.00838
scoring_system epss
scoring_elements 0.74685
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2004
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url http://www.openwall.com/lists/oss-security/2024/03/27/1
reference_id 1
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/
url http://www.openwall.com/lists/oss-security/2024/03/27/1
4
reference_url http://seclists.org/fulldisclosure/2024/Jul/18
reference_id 18
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/
url http://seclists.org/fulldisclosure/2024/Jul/18
5
reference_url http://seclists.org/fulldisclosure/2024/Jul/19
reference_id 19
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/
url http://seclists.org/fulldisclosure/2024/Jul/19
6
reference_url http://seclists.org/fulldisclosure/2024/Jul/20
reference_id 20
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/
url http://seclists.org/fulldisclosure/2024/Jul/20
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270500
reference_id 2270500
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270500
8
reference_url https://hackerone.com/reports/2384833
reference_id 2384833
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/
url https://hackerone.com/reports/2384833
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/
reference_id 2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/
10
reference_url https://curl.se/docs/CVE-2024-2004.html
reference_id CVE-2024-2004.html
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/
url https://curl.se/docs/CVE-2024-2004.html
11
reference_url https://curl.se/docs/CVE-2024-2004.json
reference_id CVE-2024-2004.json
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/
url https://curl.se/docs/CVE-2024-2004.json
12
reference_url https://security.gentoo.org/glsa/202409-20
reference_id GLSA-202409-20
reference_type
scores
url https://security.gentoo.org/glsa/202409-20
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/
reference_id GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/
14
reference_url https://support.apple.com/kb/HT214118
reference_id HT214118
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/
url https://support.apple.com/kb/HT214118
15
reference_url https://support.apple.com/kb/HT214119
reference_id HT214119
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/
url https://support.apple.com/kb/HT214119
16
reference_url https://support.apple.com/kb/HT214120
reference_id HT214120
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/
url https://support.apple.com/kb/HT214120
17
reference_url https://security.netapp.com/advisory/ntap-20240524-0006/
reference_id ntap-20240524-0006
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/
url https://security.netapp.com/advisory/ntap-20240524-0006/
18
reference_url https://access.redhat.com/errata/RHSA-2024:2693
reference_id RHSA-2024:2693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2693
19
reference_url https://access.redhat.com/errata/RHSA-2024:2694
reference_id RHSA-2024:2694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2694
20
reference_url https://usn.ubuntu.com/6718-1/
reference_id USN-6718-1
reference_type
scores
url https://usn.ubuntu.com/6718-1/
21
reference_url https://usn.ubuntu.com/6718-3/
reference_id USN-6718-3
reference_type
scores
url https://usn.ubuntu.com/6718-3/
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u6?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u6%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.7.1-1?distro=trixie
purl pkg:deb/debian/curl@8.7.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.7.1-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
7
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2024-2004
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tha5-fv3w-sub6
149
url VCID-tmv3-fzje-sbck
vulnerability_id VCID-tmv3-fzje-sbck
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which can allow remote attackers to cause Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3148.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3148.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3148
reference_id
reference_type
scores
0
value 0.01686
scoring_system epss
scoring_elements 0.82244
published_at 2026-04-16T12:55:00Z
1
value 0.01686
scoring_system epss
scoring_elements 0.82137
published_at 2026-04-01T12:55:00Z
2
value 0.01686
scoring_system epss
scoring_elements 0.8215
published_at 2026-04-02T12:55:00Z
3
value 0.01686
scoring_system epss
scoring_elements 0.82172
published_at 2026-04-04T12:55:00Z
4
value 0.01686
scoring_system epss
scoring_elements 0.82168
published_at 2026-04-07T12:55:00Z
5
value 0.01686
scoring_system epss
scoring_elements 0.82195
published_at 2026-04-08T12:55:00Z
6
value 0.01686
scoring_system epss
scoring_elements 0.82202
published_at 2026-04-09T12:55:00Z
7
value 0.01686
scoring_system epss
scoring_elements 0.82221
published_at 2026-04-11T12:55:00Z
8
value 0.01686
scoring_system epss
scoring_elements 0.82214
published_at 2026-04-12T12:55:00Z
9
value 0.01686
scoring_system epss
scoring_elements 0.82208
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3148
2
reference_url https://curl.se/docs/CVE-2015-3148.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2015-3148.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1213351
reference_id 1213351
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1213351
6
reference_url https://security.gentoo.org/glsa/201509-02
reference_id GLSA-201509-02
reference_type
scores
url https://security.gentoo.org/glsa/201509-02
7
reference_url https://access.redhat.com/errata/RHSA-2015:1254
reference_id RHSA-2015:1254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1254
8
reference_url https://access.redhat.com/errata/RHSA-2015:2159
reference_id RHSA-2015:2159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2159
9
reference_url https://usn.ubuntu.com/2591-1/
reference_id USN-2591-1
reference_type
scores
url https://usn.ubuntu.com/2591-1/
fixed_packages
0
url pkg:deb/debian/curl@7.42.0-1?distro=trixie
purl pkg:deb/debian/curl@7.42.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.42.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2015-3148
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tmv3-fzje-sbck
150
url VCID-tz47-j4ey-t7g6
vulnerability_id VCID-tz47-j4ey-t7g6
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14618.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14618.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14618
reference_id
reference_type
scores
0
value 0.00493
scoring_system epss
scoring_elements 0.65733
published_at 2026-04-16T12:55:00Z
1
value 0.00493
scoring_system epss
scoring_elements 0.65698
published_at 2026-04-13T12:55:00Z
2
value 0.006
scoring_system epss
scoring_elements 0.69387
published_at 2026-04-01T12:55:00Z
3
value 0.006
scoring_system epss
scoring_elements 0.69398
published_at 2026-04-02T12:55:00Z
4
value 0.006
scoring_system epss
scoring_elements 0.69414
published_at 2026-04-04T12:55:00Z
5
value 0.006
scoring_system epss
scoring_elements 0.69393
published_at 2026-04-07T12:55:00Z
6
value 0.006
scoring_system epss
scoring_elements 0.69444
published_at 2026-04-08T12:55:00Z
7
value 0.006
scoring_system epss
scoring_elements 0.6946
published_at 2026-04-09T12:55:00Z
8
value 0.006
scoring_system epss
scoring_elements 0.69481
published_at 2026-04-11T12:55:00Z
9
value 0.006
scoring_system epss
scoring_elements 0.69466
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14618
2
reference_url https://curl.se/docs/CVE-2018-14618.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-14618.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1622707
reference_id 1622707
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1622707
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908327
reference_id 908327
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908327
7
reference_url https://security.gentoo.org/glsa/201903-03
reference_id GLSA-201903-03
reference_type
scores
url https://security.gentoo.org/glsa/201903-03
8
reference_url https://access.redhat.com/errata/RHSA-2019:1880
reference_id RHSA-2019:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1880
9
reference_url https://usn.ubuntu.com/3765-1/
reference_id USN-3765-1
reference_type
scores
url https://usn.ubuntu.com/3765-1/
10
reference_url https://usn.ubuntu.com/3765-2/
reference_id USN-3765-2
reference_type
scores
url https://usn.ubuntu.com/3765-2/
fixed_packages
0
url pkg:deb/debian/curl@7.62.0-1?distro=trixie
purl pkg:deb/debian/curl@7.62.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.62.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2018-14618
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tz47-j4ey-t7g6
151
url VCID-u4bx-xqb3-vuef
vulnerability_id VCID-u4bx-xqb3-vuef
summary Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2398.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2398.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-2398
reference_id
reference_type
scores
0
value 0.01962
scoring_system epss
scoring_elements 0.83544
published_at 2026-04-16T12:55:00Z
1
value 0.01962
scoring_system epss
scoring_elements 0.83457
published_at 2026-04-02T12:55:00Z
2
value 0.01962
scoring_system epss
scoring_elements 0.83472
published_at 2026-04-04T12:55:00Z
3
value 0.01962
scoring_system epss
scoring_elements 0.8347
published_at 2026-04-07T12:55:00Z
4
value 0.01962
scoring_system epss
scoring_elements 0.83495
published_at 2026-04-08T12:55:00Z
5
value 0.01962
scoring_system epss
scoring_elements 0.83504
published_at 2026-04-09T12:55:00Z
6
value 0.01962
scoring_system epss
scoring_elements 0.83519
published_at 2026-04-11T12:55:00Z
7
value 0.01962
scoring_system epss
scoring_elements 0.83512
published_at 2026-04-12T12:55:00Z
8
value 0.01962
scoring_system epss
scoring_elements 0.83509
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-2398
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2398
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2398
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://seclists.org/fulldisclosure/2024/Jul/18
reference_id 18
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url http://seclists.org/fulldisclosure/2024/Jul/18
5
reference_url http://seclists.org/fulldisclosure/2024/Jul/19
reference_id 19
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url http://seclists.org/fulldisclosure/2024/Jul/19
6
reference_url http://seclists.org/fulldisclosure/2024/Jul/20
reference_id 20
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url http://seclists.org/fulldisclosure/2024/Jul/20
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270498
reference_id 2270498
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270498
8
reference_url https://hackerone.com/reports/2402845
reference_id 2402845
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url https://hackerone.com/reports/2402845
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/
reference_id 2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/
10
reference_url http://www.openwall.com/lists/oss-security/2024/03/27/3
reference_id 3
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url http://www.openwall.com/lists/oss-security/2024/03/27/3
11
reference_url https://curl.se/docs/CVE-2024-2398.html
reference_id CVE-2024-2398.html
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Medium
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url https://curl.se/docs/CVE-2024-2398.html
12
reference_url https://curl.se/docs/CVE-2024-2398.json
reference_id CVE-2024-2398.json
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url https://curl.se/docs/CVE-2024-2398.json
13
reference_url https://security.gentoo.org/glsa/202409-20
reference_id GLSA-202409-20
reference_type
scores
url https://security.gentoo.org/glsa/202409-20
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/
reference_id GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/
15
reference_url https://support.apple.com/kb/HT214118
reference_id HT214118
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url https://support.apple.com/kb/HT214118
16
reference_url https://support.apple.com/kb/HT214119
reference_id HT214119
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url https://support.apple.com/kb/HT214119
17
reference_url https://support.apple.com/kb/HT214120
reference_id HT214120
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url https://support.apple.com/kb/HT214120
18
reference_url https://security.netapp.com/advisory/ntap-20240503-0009/
reference_id ntap-20240503-0009
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/
url https://security.netapp.com/advisory/ntap-20240503-0009/
19
reference_url https://access.redhat.com/errata/RHSA-2024:10135
reference_id RHSA-2024:10135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10135
20
reference_url https://access.redhat.com/errata/RHSA-2024:11109
reference_id RHSA-2024:11109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11109
21
reference_url https://access.redhat.com/errata/RHSA-2024:2693
reference_id RHSA-2024:2693
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2693
22
reference_url https://access.redhat.com/errata/RHSA-2024:2694
reference_id RHSA-2024:2694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2694
23
reference_url https://access.redhat.com/errata/RHSA-2024:3998
reference_id RHSA-2024:3998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3998
24
reference_url https://access.redhat.com/errata/RHSA-2024:5529
reference_id RHSA-2024:5529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5529
25
reference_url https://access.redhat.com/errata/RHSA-2024:5654
reference_id RHSA-2024:5654
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5654
26
reference_url https://access.redhat.com/errata/RHSA-2024:7213
reference_id RHSA-2024:7213
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7213
27
reference_url https://access.redhat.com/errata/RHSA-2024:7374
reference_id RHSA-2024:7374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7374
28
reference_url https://usn.ubuntu.com/6718-1/
reference_id USN-6718-1
reference_type
scores
url https://usn.ubuntu.com/6718-1/
29
reference_url https://usn.ubuntu.com/6718-2/
reference_id USN-6718-2
reference_type
scores
url https://usn.ubuntu.com/6718-2/
30
reference_url https://usn.ubuntu.com/6718-3/
reference_id USN-6718-3
reference_type
scores
url https://usn.ubuntu.com/6718-3/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u12?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u12?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u12%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u6?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u6%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.7.1-1?distro=trixie
purl pkg:deb/debian/curl@8.7.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.7.1-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
7
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2024-2398
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u4bx-xqb3-vuef
152
url VCID-u9jp-j1ds-73e7
vulnerability_id VCID-u9jp-j1ds-73e7
summary curl: URL file scheme drive letter buffer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9502.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9502.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9502
reference_id
reference_type
scores
0
value 0.00555
scoring_system epss
scoring_elements 0.68058
published_at 2026-04-01T12:55:00Z
1
value 0.00555
scoring_system epss
scoring_elements 0.6808
published_at 2026-04-02T12:55:00Z
2
value 0.00555
scoring_system epss
scoring_elements 0.68099
published_at 2026-04-04T12:55:00Z
3
value 0.00555
scoring_system epss
scoring_elements 0.68077
published_at 2026-04-07T12:55:00Z
4
value 0.00555
scoring_system epss
scoring_elements 0.68128
published_at 2026-04-08T12:55:00Z
5
value 0.00555
scoring_system epss
scoring_elements 0.68143
published_at 2026-04-09T12:55:00Z
6
value 0.00555
scoring_system epss
scoring_elements 0.68167
published_at 2026-04-11T12:55:00Z
7
value 0.00555
scoring_system epss
scoring_elements 0.68154
published_at 2026-04-12T12:55:00Z
8
value 0.00555
scoring_system epss
scoring_elements 0.68121
published_at 2026-04-13T12:55:00Z
9
value 0.00555
scoring_system epss
scoring_elements 0.68157
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9502
2
reference_url https://curl.se/docs/CVE-2017-9502.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2017-9502.html
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1461321
reference_id 1461321
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1461321
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2017-9502
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u9jp-j1ds-73e7
153
url VCID-v3qf-6wju-1bg8
vulnerability_id VCID-v3qf-6wju-1bg8
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16890.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16890.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16890
reference_id
reference_type
scores
0
value 0.01397
scoring_system epss
scoring_elements 0.80347
published_at 2026-04-01T12:55:00Z
1
value 0.01397
scoring_system epss
scoring_elements 0.80428
published_at 2026-04-16T12:55:00Z
2
value 0.01397
scoring_system epss
scoring_elements 0.80353
published_at 2026-04-02T12:55:00Z
3
value 0.01397
scoring_system epss
scoring_elements 0.80373
published_at 2026-04-04T12:55:00Z
4
value 0.01397
scoring_system epss
scoring_elements 0.80362
published_at 2026-04-07T12:55:00Z
5
value 0.01397
scoring_system epss
scoring_elements 0.80391
published_at 2026-04-08T12:55:00Z
6
value 0.01397
scoring_system epss
scoring_elements 0.80402
published_at 2026-04-09T12:55:00Z
7
value 0.01397
scoring_system epss
scoring_elements 0.8042
published_at 2026-04-11T12:55:00Z
8
value 0.01397
scoring_system epss
scoring_elements 0.80405
published_at 2026-04-12T12:55:00Z
9
value 0.01397
scoring_system epss
scoring_elements 0.80398
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16890
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890
3
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf
reference_id
reference_type
scores
url https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf
4
reference_url https://curl.haxx.se/docs/CVE-2018-16890.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/CVE-2018-16890.html
5
reference_url https://curl.se/docs/CVE-2018-16890.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-16890.html
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E
11
reference_url https://security.netapp.com/advisory/ntap-20190315-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190315-0001/
12
reference_url https://support.f5.com/csp/article/K03314397?utm_source=f5support&amp%3Butm_medium=RSS
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K03314397?utm_source=f5support&amp%3Butm_medium=RSS
13
reference_url https://www.debian.org/security/2019/dsa-4386
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4386
14
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
15
reference_url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
16
reference_url http://www.securityfocus.com/bid/106947
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106947
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1670252
reference_id 1670252
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1670252
18
reference_url https://security.archlinux.org/ASA-201902-10
reference_id ASA-201902-10
reference_type
scores
url https://security.archlinux.org/ASA-201902-10
19
reference_url https://security.archlinux.org/ASA-201902-11
reference_id ASA-201902-11
reference_type
scores
url https://security.archlinux.org/ASA-201902-11
20
reference_url https://security.archlinux.org/ASA-201902-12
reference_id ASA-201902-12
reference_type
scores
url https://security.archlinux.org/ASA-201902-12
21
reference_url https://security.archlinux.org/ASA-201902-13
reference_id ASA-201902-13
reference_type
scores
url https://security.archlinux.org/ASA-201902-13
22
reference_url https://security.archlinux.org/ASA-201902-9
reference_id ASA-201902-9
reference_type
scores
url https://security.archlinux.org/ASA-201902-9
23
reference_url https://security.archlinux.org/AVG-873
reference_id AVG-873
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-873
24
reference_url https://security.archlinux.org/AVG-874
reference_id AVG-874
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-874
25
reference_url https://security.archlinux.org/AVG-875
reference_id AVG-875
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-875
26
reference_url https://security.archlinux.org/AVG-876
reference_id AVG-876
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-876
27
reference_url https://security.archlinux.org/AVG-877
reference_id AVG-877
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-877
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-16890
reference_id CVE-2018-16890
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
2
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-16890
43
reference_url https://access.redhat.com/errata/RHSA-2019:3701
reference_id RHSA-2019:3701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3701
44
reference_url https://usn.ubuntu.com/3882-1/
reference_id USN-3882-1
reference_type
scores
url https://usn.ubuntu.com/3882-1/
fixed_packages
0
url pkg:deb/debian/curl@7.64.0-1?distro=trixie
purl pkg:deb/debian/curl@7.64.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.64.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2018-16890
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v3qf-6wju-1bg8
154
url VCID-v9n1-d6xt-6ubn
vulnerability_id VCID-v9n1-d6xt-6ubn
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30115.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30115.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30115
reference_id
reference_type
scores
0
value 0.00101
scoring_system epss
scoring_elements 0.2778
published_at 2026-04-16T12:55:00Z
1
value 0.00101
scoring_system epss
scoring_elements 0.27873
published_at 2026-04-11T12:55:00Z
2
value 0.00101
scoring_system epss
scoring_elements 0.27831
published_at 2026-04-12T12:55:00Z
3
value 0.00101
scoring_system epss
scoring_elements 0.27774
published_at 2026-04-13T12:55:00Z
4
value 0.00101
scoring_system epss
scoring_elements 0.27925
published_at 2026-04-02T12:55:00Z
5
value 0.00101
scoring_system epss
scoring_elements 0.27967
published_at 2026-04-04T12:55:00Z
6
value 0.00101
scoring_system epss
scoring_elements 0.27758
published_at 2026-04-07T12:55:00Z
7
value 0.00101
scoring_system epss
scoring_elements 0.27826
published_at 2026-04-08T12:55:00Z
8
value 0.00101
scoring_system epss
scoring_elements 0.27867
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30115
2
reference_url https://curl.se/docs/CVE-2022-30115.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-30115.html
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://hackerone.com/reports/1557449
reference_id
reference_type
scores
url https://hackerone.com/reports/1557449
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082223
reference_id 2082223
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082223
6
reference_url https://security.archlinux.org/AVG-2706
reference_id AVG-2706
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2706
7
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
url https://security.gentoo.org/glsa/202212-01
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.83.1-1?distro=trixie
purl pkg:deb/debian/curl@7.83.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.1-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2022-30115
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v9n1-d6xt-6ubn
155
url VCID-vbbv-k1r7-kkas
vulnerability_id VCID-vbbv-k1r7-kkas
summary When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-15224.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-15224.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-15224
reference_id
reference_type
scores
0
value 0.00084
scoring_system epss
scoring_elements 0.24629
published_at 2026-04-02T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24485
published_at 2026-04-16T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.24667
published_at 2026-04-04T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24442
published_at 2026-04-07T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.2451
published_at 2026-04-08T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.24554
published_at 2026-04-09T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.2457
published_at 2026-04-11T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.24526
published_at 2026-04-12T12:55:00Z
8
value 0.00084
scoring_system epss
scoring_elements 0.2447
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-15224
2
reference_url https://curl.se/docs/CVE-2025-15224.html
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:38:20Z/
url https://curl.se/docs/CVE-2025-15224.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15224
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/3480925
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:38:20Z/
url https://hackerone.com/reports/3480925
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2426410
reference_id 2426410
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2426410
7
reference_url https://curl.se/docs/CVE-2025-15224.json
reference_id CVE-2025-15224.json
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:38:20Z/
url https://curl.se/docs/CVE-2025-15224.json
8
reference_url https://usn.ubuntu.com/8062-1/
reference_id USN-8062-1
reference_type
scores
url https://usn.ubuntu.com/8062-1/
9
reference_url https://usn.ubuntu.com/8062-2/
reference_id USN-8062-2
reference_type
scores
url https://usn.ubuntu.com/8062-2/
fixed_packages
0
url pkg:deb/debian/curl@8.18.0-1?distro=trixie
purl pkg:deb/debian/curl@8.18.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.18.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2025-15224
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vbbv-k1r7-kkas
156
url VCID-vr9x-yqsd-6fc8
vulnerability_id VCID-vr9x-yqsd-6fc8
summary
A heap-based buffer overflow in cURL might allow remote attackers
    to execute arbitrary code.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:2486
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2486
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0500.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0500.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-0500
reference_id
reference_type
scores
0
value 0.01151
scoring_system epss
scoring_elements 0.78441
published_at 2026-04-01T12:55:00Z
1
value 0.01151
scoring_system epss
scoring_elements 0.78519
published_at 2026-04-16T12:55:00Z
2
value 0.01151
scoring_system epss
scoring_elements 0.78447
published_at 2026-04-02T12:55:00Z
3
value 0.01151
scoring_system epss
scoring_elements 0.78478
published_at 2026-04-04T12:55:00Z
4
value 0.01151
scoring_system epss
scoring_elements 0.78461
published_at 2026-04-07T12:55:00Z
5
value 0.01151
scoring_system epss
scoring_elements 0.78488
published_at 2026-04-08T12:55:00Z
6
value 0.01151
scoring_system epss
scoring_elements 0.78493
published_at 2026-04-09T12:55:00Z
7
value 0.01151
scoring_system epss
scoring_elements 0.78518
published_at 2026-04-11T12:55:00Z
8
value 0.01151
scoring_system epss
scoring_elements 0.78499
published_at 2026-04-12T12:55:00Z
9
value 0.01151
scoring_system epss
scoring_elements 0.78491
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-0500
3
reference_url https://curl.haxx.se/docs/adv_2018-70a2.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_2018-70a2.html
4
reference_url https://curl.se/docs/CVE-2018-0500.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-0500.html
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0500
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0500
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/curl/curl/commit/ba1dbd78e5f1ed67c1b8d37ac89d90e5e330b628
reference_id
reference_type
scores
url https://github.com/curl/curl/commit/ba1dbd78e5f1ed67c1b8d37ac89d90e5e330b628
8
reference_url http://www.securitytracker.com/id/1041280
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041280
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1597101
reference_id 1597101
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1597101
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903546
reference_id 903546
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903546
11
reference_url https://security.archlinux.org/ASA-201807-10
reference_id ASA-201807-10
reference_type
scores
url https://security.archlinux.org/ASA-201807-10
12
reference_url https://security.archlinux.org/ASA-201807-5
reference_id ASA-201807-5
reference_type
scores
url https://security.archlinux.org/ASA-201807-5
13
reference_url https://security.archlinux.org/ASA-201807-6
reference_id ASA-201807-6
reference_type
scores
url https://security.archlinux.org/ASA-201807-6
14
reference_url https://security.archlinux.org/ASA-201807-7
reference_id ASA-201807-7
reference_type
scores
url https://security.archlinux.org/ASA-201807-7
15
reference_url https://security.archlinux.org/ASA-201807-8
reference_id ASA-201807-8
reference_type
scores
url https://security.archlinux.org/ASA-201807-8
16
reference_url https://security.archlinux.org/ASA-201807-9
reference_id ASA-201807-9
reference_type
scores
url https://security.archlinux.org/ASA-201807-9
17
reference_url https://security.archlinux.org/AVG-729
reference_id AVG-729
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-729
18
reference_url https://security.archlinux.org/AVG-730
reference_id AVG-730
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-730
19
reference_url https://security.archlinux.org/AVG-731
reference_id AVG-731
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-731
20
reference_url https://security.archlinux.org/AVG-732
reference_id AVG-732
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-732
21
reference_url https://security.archlinux.org/AVG-733
reference_id AVG-733
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-733
22
reference_url https://security.archlinux.org/AVG-734
reference_id AVG-734
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-734
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-0500
reference_id CVE-2018-0500
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-0500
27
reference_url https://security.gentoo.org/glsa/201807-04
reference_id GLSA-201807-04
reference_type
scores
url https://security.gentoo.org/glsa/201807-04
28
reference_url https://usn.ubuntu.com/3710-1/
reference_id USN-3710-1
reference_type
scores
url https://usn.ubuntu.com/3710-1/
fixed_packages
0
url pkg:deb/debian/curl@7.61.0-1?distro=trixie
purl pkg:deb/debian/curl@7.61.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.61.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2018-0500
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vr9x-yqsd-6fc8
157
url VCID-vxpj-xygq-9be2
vulnerability_id VCID-vxpj-xygq-9be2
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8615.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8615.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8615
reference_id
reference_type
scores
0
value 0.02337
scoring_system epss
scoring_elements 0.84774
published_at 2026-04-01T12:55:00Z
1
value 0.02337
scoring_system epss
scoring_elements 0.8487
published_at 2026-04-16T12:55:00Z
2
value 0.02337
scoring_system epss
scoring_elements 0.84789
published_at 2026-04-02T12:55:00Z
3
value 0.02337
scoring_system epss
scoring_elements 0.84808
published_at 2026-04-04T12:55:00Z
4
value 0.02337
scoring_system epss
scoring_elements 0.8481
published_at 2026-04-07T12:55:00Z
5
value 0.02337
scoring_system epss
scoring_elements 0.84832
published_at 2026-04-08T12:55:00Z
6
value 0.02337
scoring_system epss
scoring_elements 0.84839
published_at 2026-04-09T12:55:00Z
7
value 0.02337
scoring_system epss
scoring_elements 0.84857
published_at 2026-04-11T12:55:00Z
8
value 0.02337
scoring_system epss
scoring_elements 0.84854
published_at 2026-04-12T12:55:00Z
9
value 0.02337
scoring_system epss
scoring_elements 0.84849
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8615
2
reference_url https://curl.se/docs/CVE-2016-8615.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8615.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388370
reference_id 1388370
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388370
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
20
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
21
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
22
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
23
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
24
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
25
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
26
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
27
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
28
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:deb/debian/curl@7.51.0-1?distro=trixie
purl pkg:deb/debian/curl@7.51.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-8615
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vxpj-xygq-9be2
158
url VCID-vyk2-s5ut-ubbz
vulnerability_id VCID-vyk2-s5ut-ubbz
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8618.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8618.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8618
reference_id
reference_type
scores
0
value 0.01654
scoring_system epss
scoring_elements 0.81967
published_at 2026-04-01T12:55:00Z
1
value 0.01654
scoring_system epss
scoring_elements 0.82068
published_at 2026-04-16T12:55:00Z
2
value 0.01654
scoring_system epss
scoring_elements 0.81997
published_at 2026-04-07T12:55:00Z
3
value 0.01654
scoring_system epss
scoring_elements 0.82024
published_at 2026-04-08T12:55:00Z
4
value 0.01654
scoring_system epss
scoring_elements 0.82031
published_at 2026-04-09T12:55:00Z
5
value 0.01654
scoring_system epss
scoring_elements 0.82051
published_at 2026-04-11T12:55:00Z
6
value 0.01654
scoring_system epss
scoring_elements 0.8204
published_at 2026-04-12T12:55:00Z
7
value 0.01654
scoring_system epss
scoring_elements 0.82033
published_at 2026-04-13T12:55:00Z
8
value 0.01654
scoring_system epss
scoring_elements 0.81978
published_at 2026-04-02T12:55:00Z
9
value 0.01654
scoring_system epss
scoring_elements 0.82001
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8618
2
reference_url https://curl.se/docs/CVE-2016-8618.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8618.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388378
reference_id 1388378
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388378
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
19
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
20
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
21
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
22
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:deb/debian/curl@7.51.0-1?distro=trixie
purl pkg:deb/debian/curl@7.51.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-8618
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vyk2-s5ut-ubbz
159
url VCID-w8ks-xk66-r3fm
vulnerability_id VCID-w8ks-xk66-r3fm
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3823.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3823.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3823
reference_id
reference_type
scores
0
value 0.01673
scoring_system epss
scoring_elements 0.82071
published_at 2026-04-01T12:55:00Z
1
value 0.01673
scoring_system epss
scoring_elements 0.82175
published_at 2026-04-16T12:55:00Z
2
value 0.01673
scoring_system epss
scoring_elements 0.82083
published_at 2026-04-02T12:55:00Z
3
value 0.01673
scoring_system epss
scoring_elements 0.82104
published_at 2026-04-04T12:55:00Z
4
value 0.01673
scoring_system epss
scoring_elements 0.821
published_at 2026-04-07T12:55:00Z
5
value 0.01673
scoring_system epss
scoring_elements 0.82126
published_at 2026-04-08T12:55:00Z
6
value 0.01673
scoring_system epss
scoring_elements 0.82134
published_at 2026-04-09T12:55:00Z
7
value 0.01673
scoring_system epss
scoring_elements 0.82153
published_at 2026-04-11T12:55:00Z
8
value 0.01673
scoring_system epss
scoring_elements 0.82144
published_at 2026-04-12T12:55:00Z
9
value 0.01673
scoring_system epss
scoring_elements 0.82137
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3823
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823
3
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf
reference_id
reference_type
scores
url https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf
4
reference_url https://curl.haxx.se/docs/CVE-2019-3823.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/CVE-2019-3823.html
5
reference_url https://curl.se/docs/CVE-2019-3823.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2019-3823.html
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E
11
reference_url https://security.netapp.com/advisory/ntap-20190315-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190315-0001/
12
reference_url https://www.debian.org/security/2019/dsa-4386
reference_id
reference_type
scores
url https://www.debian.org/security/2019/dsa-4386
13
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
14
reference_url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
15
reference_url http://www.securityfocus.com/bid/106950
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106950
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1670256
reference_id 1670256
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1670256
17
reference_url https://security.archlinux.org/ASA-201902-10
reference_id ASA-201902-10
reference_type
scores
url https://security.archlinux.org/ASA-201902-10
18
reference_url https://security.archlinux.org/ASA-201902-11
reference_id ASA-201902-11
reference_type
scores
url https://security.archlinux.org/ASA-201902-11
19
reference_url https://security.archlinux.org/ASA-201902-12
reference_id ASA-201902-12
reference_type
scores
url https://security.archlinux.org/ASA-201902-12
20
reference_url https://security.archlinux.org/ASA-201902-13
reference_id ASA-201902-13
reference_type
scores
url https://security.archlinux.org/ASA-201902-13
21
reference_url https://security.archlinux.org/ASA-201902-9
reference_id ASA-201902-9
reference_type
scores
url https://security.archlinux.org/ASA-201902-9
22
reference_url https://security.archlinux.org/AVG-873
reference_id AVG-873
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-873
23
reference_url https://security.archlinux.org/AVG-874
reference_id AVG-874
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-874
24
reference_url https://security.archlinux.org/AVG-875
reference_id AVG-875
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-875
25
reference_url https://security.archlinux.org/AVG-876
reference_id AVG-876
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-876
26
reference_url https://security.archlinux.org/AVG-877
reference_id AVG-877
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-877
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3823
reference_id CVE-2019-3823
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
2
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-3823
39
reference_url https://security.gentoo.org/glsa/201903-03
reference_id GLSA-201903-03
reference_type
scores
url https://security.gentoo.org/glsa/201903-03
40
reference_url https://access.redhat.com/errata/RHSA-2019:3701
reference_id RHSA-2019:3701
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3701
41
reference_url https://usn.ubuntu.com/3882-1/
reference_id USN-3882-1
reference_type
scores
url https://usn.ubuntu.com/3882-1/
fixed_packages
0
url pkg:deb/debian/curl@7.64.0-1?distro=trixie
purl pkg:deb/debian/curl@7.64.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.64.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2019-3823
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w8ks-xk66-r3fm
160
url VCID-wc8j-qyp4-tqbd
vulnerability_id VCID-wc8j-qyp4-tqbd
summary Multiple untrusted search path vulnerabilities in cURL and libcurl before 7.49.1, when built with SSPI or telnet is enabled, allow local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) security.dll, (2) secur32.dll, or (3) ws2_32.dll in the application or current working directory.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4802
reference_id
reference_type
scores
0
value 0.00612
scoring_system epss
scoring_elements 0.69842
published_at 2026-04-16T12:55:00Z
1
value 0.00612
scoring_system epss
scoring_elements 0.69815
published_at 2026-04-12T12:55:00Z
2
value 0.00612
scoring_system epss
scoring_elements 0.698
published_at 2026-04-13T12:55:00Z
3
value 0.00612
scoring_system epss
scoring_elements 0.6974
published_at 2026-04-01T12:55:00Z
4
value 0.00612
scoring_system epss
scoring_elements 0.69751
published_at 2026-04-02T12:55:00Z
5
value 0.00612
scoring_system epss
scoring_elements 0.69767
published_at 2026-04-04T12:55:00Z
6
value 0.00612
scoring_system epss
scoring_elements 0.69743
published_at 2026-04-07T12:55:00Z
7
value 0.00612
scoring_system epss
scoring_elements 0.69791
published_at 2026-04-08T12:55:00Z
8
value 0.00612
scoring_system epss
scoring_elements 0.69807
published_at 2026-04-09T12:55:00Z
9
value 0.00612
scoring_system epss
scoring_elements 0.6983
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4802
1
reference_url https://curl.haxx.se/docs/adv_20160530.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_20160530.html
2
reference_url https://curl.se/docs/CVE-2016-4802.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-4802.html
3
reference_url http://www.securityfocus.com/bid/90997
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90997
4
reference_url http://www.securitytracker.com/id/1036008
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036008
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4802
reference_id CVE-2016-4802
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4802
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-4802
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wc8j-qyp4-tqbd
161
url VCID-wdhs-h36p-qbga
vulnerability_id VCID-wdhs-h36p-qbga
summary curl: negotiate not treated as connection-oriented (incomplete fix for CVE-2015-3148)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2628.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2628.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-2628
reference_id
reference_type
scores
0
value 0.00831
scoring_system epss
scoring_elements 0.74503
published_at 2026-04-01T12:55:00Z
1
value 0.00831
scoring_system epss
scoring_elements 0.74508
published_at 2026-04-02T12:55:00Z
2
value 0.00831
scoring_system epss
scoring_elements 0.74535
published_at 2026-04-04T12:55:00Z
3
value 0.00831
scoring_system epss
scoring_elements 0.74509
published_at 2026-04-07T12:55:00Z
4
value 0.00831
scoring_system epss
scoring_elements 0.74541
published_at 2026-04-08T12:55:00Z
5
value 0.00831
scoring_system epss
scoring_elements 0.74557
published_at 2026-04-09T12:55:00Z
6
value 0.00831
scoring_system epss
scoring_elements 0.74579
published_at 2026-04-11T12:55:00Z
7
value 0.00831
scoring_system epss
scoring_elements 0.7456
published_at 2026-04-12T12:55:00Z
8
value 0.00831
scoring_system epss
scoring_elements 0.74552
published_at 2026-04-13T12:55:00Z
9
value 0.00831
scoring_system epss
scoring_elements 0.7459
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-2628
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1422464
reference_id 1422464
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1422464
3
reference_url https://access.redhat.com/errata/RHSA-2017:0847
reference_id RHSA-2017:0847
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0847
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2017-2628
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wdhs-h36p-qbga
162
url VCID-wgma-bycg-1qb1
vulnerability_id VCID-wgma-bycg-1qb1
summary curl: curl netrc password leak
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11053.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11053.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11053
reference_id
reference_type
scores
0
value 0.00949
scoring_system epss
scoring_elements 0.76402
published_at 2026-04-16T12:55:00Z
1
value 0.00949
scoring_system epss
scoring_elements 0.76306
published_at 2026-04-02T12:55:00Z
2
value 0.00949
scoring_system epss
scoring_elements 0.76336
published_at 2026-04-04T12:55:00Z
3
value 0.00949
scoring_system epss
scoring_elements 0.76315
published_at 2026-04-07T12:55:00Z
4
value 0.00949
scoring_system epss
scoring_elements 0.76348
published_at 2026-04-08T12:55:00Z
5
value 0.00949
scoring_system epss
scoring_elements 0.76362
published_at 2026-04-09T12:55:00Z
6
value 0.00949
scoring_system epss
scoring_elements 0.76388
published_at 2026-04-11T12:55:00Z
7
value 0.00949
scoring_system epss
scoring_elements 0.76366
published_at 2026-04-12T12:55:00Z
8
value 0.00949
scoring_system epss
scoring_elements 0.76361
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11053
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1089682
reference_id 1089682
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1089682
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2331191
reference_id 2331191
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2331191
5
reference_url https://hackerone.com/reports/2829063
reference_id 2829063
reference_type
scores
0
value 3.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-15T16:47:42Z/
url https://hackerone.com/reports/2829063
6
reference_url https://curl.se/docs/CVE-2024-11053.html
reference_id CVE-2024-11053.html
reference_type
scores
0
value 3.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-15T16:47:42Z/
url https://curl.se/docs/CVE-2024-11053.html
7
reference_url https://curl.se/docs/CVE-2024-11053.json
reference_id CVE-2024-11053.json
reference_type
scores
0
value 3.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-15T16:47:42Z/
url https://curl.se/docs/CVE-2024-11053.json
8
reference_url https://access.redhat.com/errata/RHSA-2025:1671
reference_id RHSA-2025:1671
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1671
9
reference_url https://access.redhat.com/errata/RHSA-2025:1673
reference_id RHSA-2025:1673
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1673
10
reference_url https://usn.ubuntu.com/7162-1/
reference_id USN-7162-1
reference_type
scores
url https://usn.ubuntu.com/7162-1/
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u10?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u10%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.11.1-1?distro=trixie
purl pkg:deb/debian/curl@8.11.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.11.1-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
7
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2024-11053
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wgma-bycg-1qb1
163
url VCID-wh98-pw9h-cyfx
vulnerability_id VCID-wh98-pw9h-cyfx
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which can allow remote attackers to cause Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3145.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3145.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3145
reference_id
reference_type
scores
0
value 0.63704
scoring_system epss
scoring_elements 0.98425
published_at 2026-04-16T12:55:00Z
1
value 0.63704
scoring_system epss
scoring_elements 0.98404
published_at 2026-04-01T12:55:00Z
2
value 0.63704
scoring_system epss
scoring_elements 0.98407
published_at 2026-04-02T12:55:00Z
3
value 0.63704
scoring_system epss
scoring_elements 0.98409
published_at 2026-04-04T12:55:00Z
4
value 0.63704
scoring_system epss
scoring_elements 0.98412
published_at 2026-04-07T12:55:00Z
5
value 0.63704
scoring_system epss
scoring_elements 0.98415
published_at 2026-04-08T12:55:00Z
6
value 0.63704
scoring_system epss
scoring_elements 0.98416
published_at 2026-04-09T12:55:00Z
7
value 0.63704
scoring_system epss
scoring_elements 0.9842
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3145
2
reference_url https://curl.se/docs/CVE-2015-3145.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2015-3145.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3145
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3145
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1213347
reference_id 1213347
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1213347
5
reference_url https://security.gentoo.org/glsa/201509-02
reference_id GLSA-201509-02
reference_type
scores
url https://security.gentoo.org/glsa/201509-02
6
reference_url https://usn.ubuntu.com/2591-1/
reference_id USN-2591-1
reference_type
scores
url https://usn.ubuntu.com/2591-1/
fixed_packages
0
url pkg:deb/debian/curl@7.42.0-1?distro=trixie
purl pkg:deb/debian/curl@7.42.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.42.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2015-3145
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wh98-pw9h-cyfx
164
url VCID-wrh2-77dv-hbdz
vulnerability_id VCID-wrh2-77dv-hbdz
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3558
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8817.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8817.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8817
reference_id
reference_type
scores
0
value 0.00852
scoring_system epss
scoring_elements 0.74872
published_at 2026-04-07T12:55:00Z
1
value 0.00852
scoring_system epss
scoring_elements 0.74905
published_at 2026-04-08T12:55:00Z
2
value 0.00852
scoring_system epss
scoring_elements 0.74919
published_at 2026-04-12T12:55:00Z
3
value 0.00852
scoring_system epss
scoring_elements 0.74941
published_at 2026-04-11T12:55:00Z
4
value 0.00852
scoring_system epss
scoring_elements 0.74918
published_at 2026-04-09T12:55:00Z
5
value 0.00852
scoring_system epss
scoring_elements 0.7491
published_at 2026-04-13T12:55:00Z
6
value 0.00949
scoring_system epss
scoring_elements 0.76325
published_at 2026-04-04T12:55:00Z
7
value 0.00949
scoring_system epss
scoring_elements 0.76291
published_at 2026-04-01T12:55:00Z
8
value 0.00949
scoring_system epss
scoring_elements 0.76294
published_at 2026-04-02T12:55:00Z
9
value 0.00981
scoring_system epss
scoring_elements 0.76812
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8817
3
reference_url https://curl.haxx.se/docs/adv_2017-ae72.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_2017-ae72.html
4
reference_url https://curl.se/docs/CVE-2017-8817.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2017-8817.html
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8816
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817
7
reference_url http://security.cucumberlinux.com/security/details.php?id=162
reference_id
reference_type
scores
url http://security.cucumberlinux.com/security/details.php?id=162
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
1
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html
10
reference_url https://www.debian.org/security/2017/dsa-4051
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4051
11
reference_url http://www.securityfocus.com/bid/102057
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102057
12
reference_url http://www.securitytracker.com/id/1039897
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039897
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1515760
reference_id 1515760
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1515760
14
reference_url https://security.archlinux.org/ASA-201711-33
reference_id ASA-201711-33
reference_type
scores
url https://security.archlinux.org/ASA-201711-33
15
reference_url https://security.archlinux.org/ASA-201711-34
reference_id ASA-201711-34
reference_type
scores
url https://security.archlinux.org/ASA-201711-34
16
reference_url https://security.archlinux.org/ASA-201711-35
reference_id ASA-201711-35
reference_type
scores
url https://security.archlinux.org/ASA-201711-35
17
reference_url https://security.archlinux.org/ASA-201711-36
reference_id ASA-201711-36
reference_type
scores
url https://security.archlinux.org/ASA-201711-36
18
reference_url https://security.archlinux.org/ASA-201711-37
reference_id ASA-201711-37
reference_type
scores
url https://security.archlinux.org/ASA-201711-37
19
reference_url https://security.archlinux.org/ASA-201711-38
reference_id ASA-201711-38
reference_type
scores
url https://security.archlinux.org/ASA-201711-38
20
reference_url https://security.archlinux.org/AVG-521
reference_id AVG-521
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-521
21
reference_url https://security.archlinux.org/AVG-522
reference_id AVG-522
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-522
22
reference_url https://security.archlinux.org/AVG-523
reference_id AVG-523
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-523
23
reference_url https://security.archlinux.org/AVG-524
reference_id AVG-524
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-524
24
reference_url https://security.archlinux.org/AVG-525
reference_id AVG-525
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-525
25
reference_url https://security.archlinux.org/AVG-526
reference_id AVG-526
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-526
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8817
reference_id CVE-2017-8817
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8817
31
reference_url https://security.gentoo.org/glsa/201712-04
reference_id GLSA-201712-04
reference_type
scores
url https://security.gentoo.org/glsa/201712-04
32
reference_url https://usn.ubuntu.com/3498-1/
reference_id USN-3498-1
reference_type
scores
url https://usn.ubuntu.com/3498-1/
33
reference_url https://usn.ubuntu.com/3498-2/
reference_id USN-3498-2
reference_type
scores
url https://usn.ubuntu.com/3498-2/
fixed_packages
0
url pkg:deb/debian/curl@7.57.0-1?distro=trixie
purl pkg:deb/debian/curl@7.57.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.57.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2017-8817
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wrh2-77dv-hbdz
165
url VCID-wwam-tcmv-kqhc
vulnerability_id VCID-wwam-tcmv-kqhc
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may lead to arbitrary code execution.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5482.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5482.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-5482
reference_id
reference_type
scores
0
value 0.06912
scoring_system epss
scoring_elements 0.91427
published_at 2026-04-16T12:55:00Z
1
value 0.06912
scoring_system epss
scoring_elements 0.91403
published_at 2026-04-12T12:55:00Z
2
value 0.06912
scoring_system epss
scoring_elements 0.91402
published_at 2026-04-13T12:55:00Z
3
value 0.08332
scoring_system epss
scoring_elements 0.92281
published_at 2026-04-09T12:55:00Z
4
value 0.08332
scoring_system epss
scoring_elements 0.9225
published_at 2026-04-01T12:55:00Z
5
value 0.08332
scoring_system epss
scoring_elements 0.92286
published_at 2026-04-11T12:55:00Z
6
value 0.08332
scoring_system epss
scoring_elements 0.92257
published_at 2026-04-02T12:55:00Z
7
value 0.08332
scoring_system epss
scoring_elements 0.92262
published_at 2026-04-04T12:55:00Z
8
value 0.08332
scoring_system epss
scoring_elements 0.92265
published_at 2026-04-07T12:55:00Z
9
value 0.08332
scoring_system epss
scoring_elements 0.92277
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-5482
4
reference_url https://curl.haxx.se/docs/CVE-2019-5482.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/CVE-2019-5482.html
5
reference_url https://curl.se/docs/CVE-2019-5482.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2019-5482.html
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://hackerone.com/reports/684603
reference_id
reference_type
scores
url https://hackerone.com/reports/684603
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/
13
reference_url https://seclists.org/bugtraq/2020/Feb/36
reference_id
reference_type
scores
url https://seclists.org/bugtraq/2020/Feb/36
14
reference_url https://security.netapp.com/advisory/ntap-20191004-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20191004-0003/
15
reference_url https://security.netapp.com/advisory/ntap-20200416-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20200416-0003/
16
reference_url https://www.debian.org/security/2020/dsa-4633
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4633
17
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2020.html
18
reference_url https://www.oracle.com/security-alerts/cpujan2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpujan2020.html
19
reference_url https://www.oracle.com/security-alerts/cpuoct2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuoct2020.html
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1749652
reference_id 1749652
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1749652
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940010
reference_id 940010
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940010
22
reference_url https://security.archlinux.org/AVG-1982
reference_id AVG-1982
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1982
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_id cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_operations_monitor:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_operations_monitor:4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_border_controller:8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_essbase:11.1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:hyperion_essbase:11.1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_essbase:11.1.2.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:oss_support_tools:20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:oss_support_tools:20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:oss_support_tools:20.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-5482
reference_id CVE-2019-5482
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-5482
53
reference_url https://security.gentoo.org/glsa/202003-29
reference_id GLSA-202003-29
reference_type
scores
url https://security.gentoo.org/glsa/202003-29
54
reference_url https://access.redhat.com/errata/RHSA-2020:0250
reference_id RHSA-2020:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0250
55
reference_url https://access.redhat.com/errata/RHSA-2020:1792
reference_id RHSA-2020:1792
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1792
56
reference_url https://access.redhat.com/errata/RHSA-2020:3916
reference_id RHSA-2020:3916
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3916
57
reference_url https://access.redhat.com/errata/RHSA-2021:0759
reference_id RHSA-2021:0759
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0759
58
reference_url https://access.redhat.com/errata/RHSA-2021:0877
reference_id RHSA-2021:0877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0877
59
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
60
reference_url https://access.redhat.com/errata/RHSA-2021:1027
reference_id RHSA-2021:1027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1027
61
reference_url https://usn.ubuntu.com/4129-1/
reference_id USN-4129-1
reference_type
scores
url https://usn.ubuntu.com/4129-1/
62
reference_url https://usn.ubuntu.com/4129-2/
reference_id USN-4129-2
reference_type
scores
url https://usn.ubuntu.com/4129-2/
fixed_packages
0
url pkg:deb/debian/curl@7.66.0-1?distro=trixie
purl pkg:deb/debian/curl@7.66.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.66.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2019-5482
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wwam-tcmv-kqhc
166
url VCID-x57x-w8g8-7ybz
vulnerability_id VCID-x57x-w8g8-7ybz
summary When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14524.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14524.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14524
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07128
published_at 2026-04-02T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.0715
published_at 2026-04-16T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07177
published_at 2026-04-04T12:55:00Z
3
value 0.00026
scoring_system epss
scoring_elements 0.07151
published_at 2026-04-07T12:55:00Z
4
value 0.00026
scoring_system epss
scoring_elements 0.07206
published_at 2026-04-08T12:55:00Z
5
value 0.00026
scoring_system epss
scoring_elements 0.07237
published_at 2026-04-09T12:55:00Z
6
value 0.00026
scoring_system epss
scoring_elements 0.07234
published_at 2026-04-11T12:55:00Z
7
value 0.00026
scoring_system epss
scoring_elements 0.07222
published_at 2026-04-12T12:55:00Z
8
value 0.00026
scoring_system epss
scoring_elements 0.07212
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14524
2
reference_url https://curl.se/docs/CVE-2025-14524.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Low
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T19:24:54Z/
url https://curl.se/docs/CVE-2025-14524.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14524
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/3459417
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T19:24:54Z/
url https://hackerone.com/reports/3459417
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2426407
reference_id 2426407
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2426407
7
reference_url https://curl.se/docs/CVE-2025-14524.json
reference_id CVE-2025-14524.json
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T19:24:54Z/
url https://curl.se/docs/CVE-2025-14524.json
8
reference_url https://usn.ubuntu.com/8062-1/
reference_id USN-8062-1
reference_type
scores
url https://usn.ubuntu.com/8062-1/
fixed_packages
0
url pkg:deb/debian/curl@8.18.0~rc2-1?distro=trixie
purl pkg:deb/debian/curl@8.18.0~rc2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.18.0~rc2-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2025-14524
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x57x-w8g8-7ybz
167
url VCID-xkw8-ptjd-sfb6
vulnerability_id VCID-xkw8-ptjd-sfb6
summary
libcurl is affected by a buffer overflow in the handling of URLs for the
    TFTP protocol, which could be exploited to compromise a user's system.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-1061
reference_id
reference_type
scores
0
value 0.03827
scoring_system epss
scoring_elements 0.88156
published_at 2026-04-16T12:55:00Z
1
value 0.03827
scoring_system epss
scoring_elements 0.88083
published_at 2026-04-01T12:55:00Z
2
value 0.03827
scoring_system epss
scoring_elements 0.88092
published_at 2026-04-02T12:55:00Z
3
value 0.03827
scoring_system epss
scoring_elements 0.88108
published_at 2026-04-04T12:55:00Z
4
value 0.03827
scoring_system epss
scoring_elements 0.88114
published_at 2026-04-07T12:55:00Z
5
value 0.03827
scoring_system epss
scoring_elements 0.88133
published_at 2026-04-08T12:55:00Z
6
value 0.03827
scoring_system epss
scoring_elements 0.88139
published_at 2026-04-09T12:55:00Z
7
value 0.03827
scoring_system epss
scoring_elements 0.88148
published_at 2026-04-11T12:55:00Z
8
value 0.03827
scoring_system epss
scoring_elements 0.88141
published_at 2026-04-12T12:55:00Z
9
value 0.03827
scoring_system epss
scoring_elements 0.88143
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-1061
1
reference_url https://curl.se/docs/CVE-2006-1061.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2006-1061.html
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1061
3
reference_url https://security.gentoo.org/glsa/200603-19
reference_id GLSA-200603-19
reference_type
scores
url https://security.gentoo.org/glsa/200603-19
fixed_packages
0
url pkg:deb/debian/curl@7.15.3-1?distro=trixie
purl pkg:deb/debian/curl@7.15.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.15.3-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2006-1061
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xkw8-ptjd-sfb6
168
url VCID-xm7g-6w3z-37fs
vulnerability_id VCID-xm7g-6w3z-37fs
summary libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3564.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3564.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3564
reference_id
reference_type
scores
0
value 0.00635
scoring_system epss
scoring_elements 0.70433
published_at 2026-04-16T12:55:00Z
1
value 0.00635
scoring_system epss
scoring_elements 0.70329
published_at 2026-04-01T12:55:00Z
2
value 0.00635
scoring_system epss
scoring_elements 0.70341
published_at 2026-04-02T12:55:00Z
3
value 0.00635
scoring_system epss
scoring_elements 0.70358
published_at 2026-04-04T12:55:00Z
4
value 0.00635
scoring_system epss
scoring_elements 0.70336
published_at 2026-04-07T12:55:00Z
5
value 0.00635
scoring_system epss
scoring_elements 0.70381
published_at 2026-04-08T12:55:00Z
6
value 0.00635
scoring_system epss
scoring_elements 0.70396
published_at 2026-04-09T12:55:00Z
7
value 0.00635
scoring_system epss
scoring_elements 0.7042
published_at 2026-04-11T12:55:00Z
8
value 0.00635
scoring_system epss
scoring_elements 0.70405
published_at 2026-04-12T12:55:00Z
9
value 0.00635
scoring_system epss
scoring_elements 0.7039
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3564
2
reference_url https://curl.se/docs/CVE-2007-3564.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2007-3564.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3564
4
reference_url https://usn.ubuntu.com/484-1/
reference_id USN-484-1
reference_type
scores
url https://usn.ubuntu.com/484-1/
fixed_packages
0
url pkg:deb/debian/curl@7.16.4-1?distro=trixie
purl pkg:deb/debian/curl@7.16.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.16.4-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2007-3564
risk_score 1.1
exploitability 0.5
weighted_severity 2.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xm7g-6w3z-37fs
169
url VCID-xpss-yndr-mycj
vulnerability_id VCID-xpss-yndr-mycj
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43551.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43551.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43551
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.1269
published_at 2026-04-16T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12923
published_at 2026-04-02T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12972
published_at 2026-04-04T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12773
published_at 2026-04-07T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12852
published_at 2026-04-08T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12902
published_at 2026-04-09T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12868
published_at 2026-04-11T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12831
published_at 2026-04-12T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12786
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43551
2
reference_url https://curl.se/docs/CVE-2022-43551.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-43551.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43551
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1755083
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-15T14:38:16Z/
url https://hackerone.com/reports/1755083
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026829
reference_id 1026829
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026829
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2152639
reference_id 2152639
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2152639
8
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-15T14:38:16Z/
url https://security.gentoo.org/glsa/202310-12
9
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-15T14:38:16Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
10
reference_url https://access.redhat.com/errata/RHSA-2023:3354
reference_id RHSA-2023:3354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3354
11
reference_url https://access.redhat.com/errata/RHSA-2023:3355
reference_id RHSA-2023:3355
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3355
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVWZW5CNSJ7UYAF2BGSYAWAEXDJYUBHA/
reference_id TVWZW5CNSJ7UYAF2BGSYAWAEXDJYUBHA
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-15T14:38:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVWZW5CNSJ7UYAF2BGSYAWAEXDJYUBHA/
13
reference_url https://usn.ubuntu.com/5788-1/
reference_id USN-5788-1
reference_type
scores
url https://usn.ubuntu.com/5788-1/
fixed_packages
0
url pkg:deb/debian/curl@7.86.0-3?distro=trixie
purl pkg:deb/debian/curl@7.86.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.86.0-3%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
2
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2022-43551
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xpss-yndr-mycj
170
url VCID-xspf-45t1-2uhf
vulnerability_id VCID-xspf-45t1-2uhf
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which can allow remote attackers to cause Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3143.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3143.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3143
reference_id
reference_type
scores
0
value 0.03475
scoring_system epss
scoring_elements 0.8757
published_at 2026-04-16T12:55:00Z
1
value 0.03475
scoring_system epss
scoring_elements 0.875
published_at 2026-04-01T12:55:00Z
2
value 0.03475
scoring_system epss
scoring_elements 0.8751
published_at 2026-04-02T12:55:00Z
3
value 0.03475
scoring_system epss
scoring_elements 0.87524
published_at 2026-04-04T12:55:00Z
4
value 0.03475
scoring_system epss
scoring_elements 0.87526
published_at 2026-04-07T12:55:00Z
5
value 0.03475
scoring_system epss
scoring_elements 0.87545
published_at 2026-04-08T12:55:00Z
6
value 0.03475
scoring_system epss
scoring_elements 0.87552
published_at 2026-04-09T12:55:00Z
7
value 0.03475
scoring_system epss
scoring_elements 0.87563
published_at 2026-04-11T12:55:00Z
8
value 0.03475
scoring_system epss
scoring_elements 0.87559
published_at 2026-04-12T12:55:00Z
9
value 0.03475
scoring_system epss
scoring_elements 0.87556
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3143
2
reference_url https://curl.se/docs/CVE-2015-3143.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2015-3143.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1213306
reference_id 1213306
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1213306
6
reference_url https://security.gentoo.org/glsa/201509-02
reference_id GLSA-201509-02
reference_type
scores
url https://security.gentoo.org/glsa/201509-02
7
reference_url https://access.redhat.com/errata/RHSA-2015:1254
reference_id RHSA-2015:1254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1254
8
reference_url https://access.redhat.com/errata/RHSA-2015:2159
reference_id RHSA-2015:2159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2159
9
reference_url https://usn.ubuntu.com/2591-1/
reference_id USN-2591-1
reference_type
scores
url https://usn.ubuntu.com/2591-1/
fixed_packages
0
url pkg:deb/debian/curl@7.42.0-1?distro=trixie
purl pkg:deb/debian/curl@7.42.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.42.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2015-3143
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xspf-45t1-2uhf
171
url VCID-xzay-sjpy-3yce
vulnerability_id VCID-xzay-sjpy-3yce
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32206
reference_id
reference_type
scores
0
value 0.04546
scoring_system epss
scoring_elements 0.892
published_at 2026-04-16T12:55:00Z
1
value 0.04546
scoring_system epss
scoring_elements 0.89143
published_at 2026-04-02T12:55:00Z
2
value 0.04546
scoring_system epss
scoring_elements 0.89158
published_at 2026-04-04T12:55:00Z
3
value 0.04546
scoring_system epss
scoring_elements 0.89161
published_at 2026-04-07T12:55:00Z
4
value 0.04546
scoring_system epss
scoring_elements 0.89178
published_at 2026-04-08T12:55:00Z
5
value 0.04546
scoring_system epss
scoring_elements 0.89183
published_at 2026-04-09T12:55:00Z
6
value 0.04546
scoring_system epss
scoring_elements 0.89193
published_at 2026-04-11T12:55:00Z
7
value 0.04546
scoring_system epss
scoring_elements 0.89189
published_at 2026-04-12T12:55:00Z
8
value 0.04546
scoring_system epss
scoring_elements 0.89187
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32206
2
reference_url https://curl.se/docs/CVE-2022-32206.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-32206.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1570651
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/
url https://hackerone.com/reports/1570651
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2099300
reference_id 2099300
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2099300
21
reference_url http://seclists.org/fulldisclosure/2022/Oct/28
reference_id 28
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/
url http://seclists.org/fulldisclosure/2022/Oct/28
22
reference_url http://www.openwall.com/lists/oss-security/2023/02/15/3
reference_id 3
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/
url http://www.openwall.com/lists/oss-security/2023/02/15/3
23
reference_url http://seclists.org/fulldisclosure/2022/Oct/41
reference_id 41
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/
url http://seclists.org/fulldisclosure/2022/Oct/41
24
reference_url https://security.archlinux.org/AVG-2817
reference_id AVG-2817
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2817
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
reference_id BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
26
reference_url https://www.debian.org/security/2022/dsa-5197
reference_id dsa-5197
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/
url https://www.debian.org/security/2022/dsa-5197
27
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/
url https://security.gentoo.org/glsa/202212-01
28
reference_url https://support.apple.com/kb/HT213488
reference_id HT213488
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/
url https://support.apple.com/kb/HT213488
29
reference_url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/
url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
30
reference_url https://security.netapp.com/advisory/ntap-20220915-0003/
reference_id ntap-20220915-0003
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/
url https://security.netapp.com/advisory/ntap-20220915-0003/
31
reference_url https://access.redhat.com/errata/RHSA-2022:6157
reference_id RHSA-2022:6157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6157
32
reference_url https://access.redhat.com/errata/RHSA-2022:6159
reference_id RHSA-2022:6159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6159
33
reference_url https://access.redhat.com/errata/RHSA-2022:8840
reference_id RHSA-2022:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8840
34
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
35
reference_url https://access.redhat.com/errata/RHSA-2023:3460
reference_id RHSA-2023:3460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3460
36
reference_url https://usn.ubuntu.com/5495-1/
reference_id USN-5495-1
reference_type
scores
url https://usn.ubuntu.com/5495-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.84.0-1?distro=trixie
purl pkg:deb/debian/curl@7.84.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.84.0-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2022-32206
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xzay-sjpy-3yce
172
url VCID-y32p-52ps-4ug4
vulnerability_id VCID-y32p-52ps-4ug4
summary
Use of Incorrectly-Resolved Name or Reference
libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function does not take `issuercert` into account and it compared the involved paths *case insensitively*, which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn't include the `issuer cert` which a transfer can set to qualify how to verify the server certificate.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22924.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22924.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-22924
reference_id
reference_type
scores
0
value 0.00746
scoring_system epss
scoring_elements 0.73012
published_at 2026-04-01T12:55:00Z
1
value 0.00746
scoring_system epss
scoring_elements 0.73021
published_at 2026-04-02T12:55:00Z
2
value 0.00746
scoring_system epss
scoring_elements 0.73016
published_at 2026-04-07T12:55:00Z
3
value 0.00746
scoring_system epss
scoring_elements 0.73107
published_at 2026-04-16T12:55:00Z
4
value 0.00746
scoring_system epss
scoring_elements 0.73064
published_at 2026-04-13T12:55:00Z
5
value 0.00746
scoring_system epss
scoring_elements 0.7307
published_at 2026-04-12T12:55:00Z
6
value 0.00746
scoring_system epss
scoring_elements 0.73091
published_at 2026-04-11T12:55:00Z
7
value 0.00746
scoring_system epss
scoring_elements 0.73066
published_at 2026-04-09T12:55:00Z
8
value 0.00746
scoring_system epss
scoring_elements 0.73053
published_at 2026-04-08T12:55:00Z
9
value 0.00746
scoring_system epss
scoring_elements 0.73042
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-22924
2
reference_url https://curl.se/docs/CVE-2021-22924.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2021-22924.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1223565
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://hackerone.com/reports/1223565
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1981460
reference_id 1981460
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1981460
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991492
reference_id 991492
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991492
22
reference_url https://security.archlinux.org/ASA-202107-59
reference_id ASA-202107-59
reference_type
scores
url https://security.archlinux.org/ASA-202107-59
23
reference_url https://security.archlinux.org/ASA-202107-60
reference_id ASA-202107-60
reference_type
scores
url https://security.archlinux.org/ASA-202107-60
24
reference_url https://security.archlinux.org/ASA-202107-61
reference_id ASA-202107-61
reference_type
scores
url https://security.archlinux.org/ASA-202107-61
25
reference_url https://security.archlinux.org/ASA-202107-62
reference_id ASA-202107-62
reference_type
scores
url https://security.archlinux.org/ASA-202107-62
26
reference_url https://security.archlinux.org/ASA-202107-63
reference_id ASA-202107-63
reference_type
scores
url https://security.archlinux.org/ASA-202107-63
27
reference_url https://security.archlinux.org/ASA-202107-64
reference_id ASA-202107-64
reference_type
scores
url https://security.archlinux.org/ASA-202107-64
28
reference_url https://security.archlinux.org/AVG-2194
reference_id AVG-2194
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2194
29
reference_url https://security.archlinux.org/AVG-2195
reference_id AVG-2195
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2195
30
reference_url https://security.archlinux.org/AVG-2196
reference_id AVG-2196
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2196
31
reference_url https://security.archlinux.org/AVG-2197
reference_id AVG-2197
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2197
32
reference_url https://security.archlinux.org/AVG-2198
reference_id AVG-2198
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2198
33
reference_url https://security.archlinux.org/AVG-2199
reference_id AVG-2199
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2199
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-22924
reference_id CVE-2021-22924
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-22924
35
reference_url https://www.debian.org/security/2022/dsa-5197
reference_id dsa-5197
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://www.debian.org/security/2022/dsa-5197
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
reference_id FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
37
reference_url https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html
38
reference_url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
39
reference_url https://security.netapp.com/advisory/ntap-20210902-0003/
reference_id ntap-20210902-0003
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://security.netapp.com/advisory/ntap-20210902-0003/
40
reference_url https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
reference_id r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
41
reference_url https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
reference_id r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
42
reference_url https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
reference_id rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
43
reference_url https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
reference_id rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
44
reference_url https://access.redhat.com/errata/RHSA-2021:3582
reference_id RHSA-2021:3582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3582
45
reference_url https://access.redhat.com/errata/RHSA-2022:1354
reference_id RHSA-2022:1354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1354
46
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
reference_id ssa-484086.pdf
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
47
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
reference_id ssa-732250.pdf
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
48
reference_url https://usn.ubuntu.com/5021-1/
reference_id USN-5021-1
reference_type
scores
url https://usn.ubuntu.com/5021-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.79.1-1?distro=trixie
purl pkg:deb/debian/curl@7.79.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.79.1-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2021-22924
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y32p-52ps-4ug4
173
url VCID-y4x5-n5m2-x7bq
vulnerability_id VCID-y4x5-n5m2-x7bq
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32208
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.37884
published_at 2026-04-16T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37916
published_at 2026-04-02T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37942
published_at 2026-04-04T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37819
published_at 2026-04-07T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.3787
published_at 2026-04-08T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.37883
published_at 2026-04-09T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37898
published_at 2026-04-11T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37862
published_at 2026-04-12T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37837
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32208
2
reference_url https://curl.se/docs/CVE-2022-32208.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-32208.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208
18
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
19
reference_url https://hackerone.com/reports/1590071
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url https://hackerone.com/reports/1590071
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2099306
reference_id 2099306
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2099306
21
reference_url http://seclists.org/fulldisclosure/2022/Oct/28
reference_id 28
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url http://seclists.org/fulldisclosure/2022/Oct/28
22
reference_url http://seclists.org/fulldisclosure/2022/Oct/41
reference_id 41
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url http://seclists.org/fulldisclosure/2022/Oct/41
23
reference_url https://security.archlinux.org/AVG-2817
reference_id AVG-2817
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2817
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
reference_id BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
25
reference_url https://www.debian.org/security/2022/dsa-5197
reference_id dsa-5197
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url https://www.debian.org/security/2022/dsa-5197
26
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url https://security.gentoo.org/glsa/202212-01
27
reference_url https://support.apple.com/kb/HT213488
reference_id HT213488
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url https://support.apple.com/kb/HT213488
28
reference_url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
reference_id msg00017.html
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html
29
reference_url https://security.netapp.com/advisory/ntap-20220915-0003/
reference_id ntap-20220915-0003
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/
url https://security.netapp.com/advisory/ntap-20220915-0003/
30
reference_url https://access.redhat.com/errata/RHSA-2022:6157
reference_id RHSA-2022:6157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6157
31
reference_url https://access.redhat.com/errata/RHSA-2022:6159
reference_id RHSA-2022:6159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6159
32
reference_url https://access.redhat.com/errata/RHSA-2022:8840
reference_id RHSA-2022:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8840
33
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
34
reference_url https://usn.ubuntu.com/5495-1/
reference_id USN-5495-1
reference_type
scores
url https://usn.ubuntu.com/5495-1/
35
reference_url https://usn.ubuntu.com/5499-1/
reference_id USN-5499-1
reference_type
scores
url https://usn.ubuntu.com/5499-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.84.0-1?distro=trixie
purl pkg:deb/debian/curl@7.84.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.84.0-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2022-32208
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y4x5-n5m2-x7bq
174
url VCID-ya9y-nav3-37hh
vulnerability_id VCID-ya9y-nav3-37hh
summary curl and libcurl 7.27.0 through 7.35.0, when using the SecureTransport/Darwinssl backend, as used in in Apple OS X 10.9.x before 10.9.2, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP address, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1263
reference_id
reference_type
scores
0
value 0.05846
scoring_system epss
scoring_elements 0.90563
published_at 2026-04-16T12:55:00Z
1
value 0.05846
scoring_system epss
scoring_elements 0.90504
published_at 2026-04-01T12:55:00Z
2
value 0.05846
scoring_system epss
scoring_elements 0.90508
published_at 2026-04-02T12:55:00Z
3
value 0.05846
scoring_system epss
scoring_elements 0.90519
published_at 2026-04-04T12:55:00Z
4
value 0.05846
scoring_system epss
scoring_elements 0.90525
published_at 2026-04-07T12:55:00Z
5
value 0.05846
scoring_system epss
scoring_elements 0.90538
published_at 2026-04-08T12:55:00Z
6
value 0.05846
scoring_system epss
scoring_elements 0.90544
published_at 2026-04-09T12:55:00Z
7
value 0.05846
scoring_system epss
scoring_elements 0.90552
published_at 2026-04-12T12:55:00Z
8
value 0.05846
scoring_system epss
scoring_elements 0.90546
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1263
1
reference_url https://curl.se/docs/CVE-2014-1263.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2014-1263.html
fixed_packages
0
url pkg:deb/debian/curl@0?distro=trixie
purl pkg:deb/debian/curl@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2014-1263
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ya9y-nav3-37hh
175
url VCID-yaas-j3qk-kfdg
vulnerability_id VCID-yaas-j3qk-kfdg
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42916.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42916.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42916
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.25964
published_at 2026-04-16T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.25934
published_at 2026-04-07T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.26002
published_at 2026-04-08T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.26053
published_at 2026-04-09T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26063
published_at 2026-04-11T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.26017
published_at 2026-04-12T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.25958
published_at 2026-04-13T12:55:00Z
7
value 0.00121
scoring_system epss
scoring_elements 0.31202
published_at 2026-04-04T12:55:00Z
8
value 0.00121
scoring_system epss
scoring_elements 0.31155
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42916
2
reference_url https://curl.se/docs/CVE-2022-42916.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Medium
scoring_system cvssv3.1
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/
url https://curl.se/docs/CVE-2022-42916.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42916
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://hackerone.com/reports/1730660
reference_id
reference_type
scores
url https://hackerone.com/reports/1730660
6
reference_url http://www.openwall.com/lists/oss-security/2022/12/21/1
reference_id 1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/
url http://www.openwall.com/lists/oss-security/2022/12/21/1
7
reference_url http://seclists.org/fulldisclosure/2023/Jan/19
reference_id 19
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/
url http://seclists.org/fulldisclosure/2023/Jan/19
8
reference_url http://seclists.org/fulldisclosure/2023/Jan/20
reference_id 20
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/
url http://seclists.org/fulldisclosure/2023/Jan/20
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2135416
reference_id 2135416
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2135416
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/
reference_id 37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/
11
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/
url https://security.gentoo.org/glsa/202212-01
12
reference_url https://support.apple.com/kb/HT213604
reference_id HT213604
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/
url https://support.apple.com/kb/HT213604
13
reference_url https://support.apple.com/kb/HT213605
reference_id HT213605
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/
url https://support.apple.com/kb/HT213605
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/
reference_id HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/
15
reference_url https://security.netapp.com/advisory/ntap-20221209-0010/
reference_id ntap-20221209-0010
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/
url https://security.netapp.com/advisory/ntap-20221209-0010/
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/
reference_id Q27V5YYMXUVI6PRZQVECON32XPVWTKDK
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/
17
reference_url https://access.redhat.com/errata/RHSA-2022:8840
reference_id RHSA-2022:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8840
18
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
19
reference_url https://usn.ubuntu.com/5702-1/
reference_id USN-5702-1
reference_type
scores
url https://usn.ubuntu.com/5702-1/
fixed_packages
0
url pkg:deb/debian/curl@7.86.0-1?distro=trixie
purl pkg:deb/debian/curl@7.86.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.86.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
2
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2022-42916
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yaas-j3qk-kfdg
176
url VCID-yubp-g4rt-c3e6
vulnerability_id VCID-yubp-g4rt-c3e6
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which can allow remote attackers to cause Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3236.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3236.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3236
reference_id
reference_type
scores
0
value 0.04525
scoring_system epss
scoring_elements 0.89176
published_at 2026-04-16T12:55:00Z
1
value 0.04525
scoring_system epss
scoring_elements 0.89112
published_at 2026-04-01T12:55:00Z
2
value 0.04525
scoring_system epss
scoring_elements 0.89119
published_at 2026-04-02T12:55:00Z
3
value 0.04525
scoring_system epss
scoring_elements 0.89134
published_at 2026-04-04T12:55:00Z
4
value 0.04525
scoring_system epss
scoring_elements 0.89137
published_at 2026-04-07T12:55:00Z
5
value 0.04525
scoring_system epss
scoring_elements 0.89155
published_at 2026-04-08T12:55:00Z
6
value 0.04525
scoring_system epss
scoring_elements 0.8916
published_at 2026-04-09T12:55:00Z
7
value 0.04525
scoring_system epss
scoring_elements 0.8917
published_at 2026-04-11T12:55:00Z
8
value 0.04525
scoring_system epss
scoring_elements 0.89166
published_at 2026-04-12T12:55:00Z
9
value 0.04525
scoring_system epss
scoring_elements 0.89164
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3236
2
reference_url https://curl.se/docs/CVE-2015-3236.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2015-3236.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3236
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3236
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1233816
reference_id 1233816
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1233816
5
reference_url https://security.gentoo.org/glsa/201509-02
reference_id GLSA-201509-02
reference_type
scores
url https://security.gentoo.org/glsa/201509-02
fixed_packages
0
url pkg:deb/debian/curl@7.43.0-1?distro=trixie
purl pkg:deb/debian/curl@7.43.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.43.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2015-3236
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yubp-g4rt-c3e6
177
url VCID-yvdd-ataf-ckf1
vulnerability_id VCID-yvdd-ataf-ckf1
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in information disclosure or data loss.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8231.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8231.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8231
reference_id
reference_type
scores
0
value 0.00159
scoring_system epss
scoring_elements 0.36844
published_at 2026-04-16T12:55:00Z
1
value 0.00159
scoring_system epss
scoring_elements 0.36823
published_at 2026-04-12T12:55:00Z
2
value 0.00159
scoring_system epss
scoring_elements 0.36798
published_at 2026-04-13T12:55:00Z
3
value 0.00222
scoring_system epss
scoring_elements 0.44841
published_at 2026-04-02T12:55:00Z
4
value 0.00222
scoring_system epss
scoring_elements 0.44863
published_at 2026-04-04T12:55:00Z
5
value 0.00222
scoring_system epss
scoring_elements 0.44803
published_at 2026-04-07T12:55:00Z
6
value 0.00222
scoring_system epss
scoring_elements 0.44855
published_at 2026-04-08T12:55:00Z
7
value 0.00222
scoring_system epss
scoring_elements 0.44858
published_at 2026-04-09T12:55:00Z
8
value 0.00222
scoring_system epss
scoring_elements 0.44875
published_at 2026-04-11T12:55:00Z
9
value 0.00222
scoring_system epss
scoring_elements 0.44761
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8231
2
reference_url https://curl.se/docs/CVE-2020-8231.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2020-8231.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://hackerone.com/reports/948876
reference_id
reference_type
scores
url https://hackerone.com/reports/948876
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1868032
reference_id 1868032
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1868032
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968831
reference_id 968831
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968831
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-8231
reference_id CVE-2020-8231
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2020-8231
16
reference_url https://security.gentoo.org/glsa/202012-14
reference_id GLSA-202012-14
reference_type
scores
url https://security.gentoo.org/glsa/202012-14
17
reference_url https://access.redhat.com/errata/RHSA-2021:1610
reference_id RHSA-2021:1610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1610
18
reference_url https://usn.ubuntu.com/4466-1/
reference_id USN-4466-1
reference_type
scores
url https://usn.ubuntu.com/4466-1/
19
reference_url https://usn.ubuntu.com/4466-2/
reference_id USN-4466-2
reference_type
scores
url https://usn.ubuntu.com/4466-2/
20
reference_url https://usn.ubuntu.com/4665-1/
reference_id USN-4665-1
reference_type
scores
url https://usn.ubuntu.com/4665-1/
fixed_packages
0
url pkg:deb/debian/curl@7.72.0-1?distro=trixie
purl pkg:deb/debian/curl@7.72.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.72.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2020-8231
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yvdd-ataf-ckf1
178
url VCID-yxks-8529-23bj
vulnerability_id VCID-yxks-8529-23bj
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8625.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8625.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8625
reference_id
reference_type
scores
0
value 0.01526
scoring_system epss
scoring_elements 0.81219
published_at 2026-04-01T12:55:00Z
1
value 0.01526
scoring_system epss
scoring_elements 0.8132
published_at 2026-04-16T12:55:00Z
2
value 0.01526
scoring_system epss
scoring_elements 0.81228
published_at 2026-04-02T12:55:00Z
3
value 0.01526
scoring_system epss
scoring_elements 0.81251
published_at 2026-04-04T12:55:00Z
4
value 0.01526
scoring_system epss
scoring_elements 0.8125
published_at 2026-04-07T12:55:00Z
5
value 0.01526
scoring_system epss
scoring_elements 0.81278
published_at 2026-04-08T12:55:00Z
6
value 0.01526
scoring_system epss
scoring_elements 0.81283
published_at 2026-04-13T12:55:00Z
7
value 0.01526
scoring_system epss
scoring_elements 0.81304
published_at 2026-04-11T12:55:00Z
8
value 0.01526
scoring_system epss
scoring_elements 0.8129
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8625
2
reference_url https://curl.se/docs/CVE-2016-8625.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8625.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388392
reference_id 1388392
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388392
6
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
7
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
8
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
9
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
10
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
11
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
12
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
13
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
14
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
15
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
16
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
17
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
18
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
fixed_packages
0
url pkg:deb/debian/curl@7.51.0-1?distro=trixie
purl pkg:deb/debian/curl@7.51.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-8625
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yxks-8529-23bj
179
url VCID-z49y-v1gh-h7gj
vulnerability_id VCID-z49y-v1gh-h7gj
summary
Multiple vulnerabilities have been found in cURL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2174.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2174.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2174
reference_id
reference_type
scores
0
value 0.03181
scoring_system epss
scoring_elements 0.86981
published_at 2026-04-16T12:55:00Z
1
value 0.03181
scoring_system epss
scoring_elements 0.86912
published_at 2026-04-01T12:55:00Z
2
value 0.03181
scoring_system epss
scoring_elements 0.86923
published_at 2026-04-02T12:55:00Z
3
value 0.03181
scoring_system epss
scoring_elements 0.86942
published_at 2026-04-04T12:55:00Z
4
value 0.03181
scoring_system epss
scoring_elements 0.86936
published_at 2026-04-07T12:55:00Z
5
value 0.03181
scoring_system epss
scoring_elements 0.86956
published_at 2026-04-08T12:55:00Z
6
value 0.03181
scoring_system epss
scoring_elements 0.86963
published_at 2026-04-09T12:55:00Z
7
value 0.03181
scoring_system epss
scoring_elements 0.86977
published_at 2026-04-11T12:55:00Z
8
value 0.03181
scoring_system epss
scoring_elements 0.86971
published_at 2026-04-12T12:55:00Z
9
value 0.03181
scoring_system epss
scoring_elements 0.86966
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2174
2
reference_url https://curl.se/docs/CVE-2013-2174.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2013-2174.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=965640
reference_id 965640
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=965640
5
reference_url https://security.gentoo.org/glsa/201401-14
reference_id GLSA-201401-14
reference_type
scores
url https://security.gentoo.org/glsa/201401-14
6
reference_url https://access.redhat.com/errata/RHSA-2013:0983
reference_id RHSA-2013:0983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0983
7
reference_url https://usn.ubuntu.com/1894-1/
reference_id USN-1894-1
reference_type
scores
url https://usn.ubuntu.com/1894-1/
fixed_packages
0
url pkg:deb/debian/curl@7.31.0-1?distro=trixie
purl pkg:deb/debian/curl@7.31.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.31.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2013-2174
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z49y-v1gh-h7gj
180
url VCID-z8h3-fdj8-xuaa
vulnerability_id VCID-z8h3-fdj8-xuaa
summary
Multiple vulnerabilities have been discovered in cURL, the worst of
    which could lead to man-in-the-middle attacks.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0138.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0138.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0138
reference_id
reference_type
scores
0
value 0.00676
scoring_system epss
scoring_elements 0.71517
published_at 2026-04-16T12:55:00Z
1
value 0.00676
scoring_system epss
scoring_elements 0.71431
published_at 2026-04-07T12:55:00Z
2
value 0.00676
scoring_system epss
scoring_elements 0.71439
published_at 2026-04-02T12:55:00Z
3
value 0.00676
scoring_system epss
scoring_elements 0.71457
published_at 2026-04-04T12:55:00Z
4
value 0.00676
scoring_system epss
scoring_elements 0.71471
published_at 2026-04-08T12:55:00Z
5
value 0.00676
scoring_system epss
scoring_elements 0.71483
published_at 2026-04-09T12:55:00Z
6
value 0.00676
scoring_system epss
scoring_elements 0.71506
published_at 2026-04-11T12:55:00Z
7
value 0.00676
scoring_system epss
scoring_elements 0.7149
published_at 2026-04-12T12:55:00Z
8
value 0.00676
scoring_system epss
scoring_elements 0.71472
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0138
2
reference_url https://curl.se/docs/CVE-2014-0138.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2014-0138.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1079148
reference_id 1079148
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1079148
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742728
reference_id 742728
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742728
7
reference_url https://security.gentoo.org/glsa/201406-21
reference_id GLSA-201406-21
reference_type
scores
url https://security.gentoo.org/glsa/201406-21
8
reference_url https://access.redhat.com/errata/RHSA-2014:0561
reference_id RHSA-2014:0561
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0561
9
reference_url https://usn.ubuntu.com/2167-1/
reference_id USN-2167-1
reference_type
scores
url https://usn.ubuntu.com/2167-1/
fixed_packages
0
url pkg:deb/debian/curl@7.36.0-1?distro=trixie
purl pkg:deb/debian/curl@7.36.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.36.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2014-0138
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z8h3-fdj8-xuaa
181
url VCID-zxz2-xfpd-pbay
vulnerability_id VCID-zxz2-xfpd-pbay
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8617.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8617.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8617
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19573
published_at 2026-04-01T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19482
published_at 2026-04-16T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19714
published_at 2026-04-02T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19763
published_at 2026-04-04T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19488
published_at 2026-04-07T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19567
published_at 2026-04-08T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19619
published_at 2026-04-09T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19623
published_at 2026-04-11T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19575
published_at 2026-04-12T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19517
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8617
2
reference_url https://curl.se/docs/CVE-2016-8617.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8617.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388377
reference_id 1388377
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388377
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
20
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
21
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
22
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
23
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
24
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
25
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
26
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
27
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
28
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:deb/debian/curl@7.51.0-1?distro=trixie
purl pkg:deb/debian/curl@7.51.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
3
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
aliases CVE-2016-8617
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zxz2-xfpd-pbay
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie