| 0 |
| url |
VCID-176a-agbw-hqdy |
| vulnerability_id |
VCID-176a-agbw-hqdy |
| summary |
curl: libcurl: QUIC Certificate Pinning Bypass |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-5025 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18841 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.19078 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.19129 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18846 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18926 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18979 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18986 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18939 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18888 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-5025 |
|
| 2 |
| reference_url |
https://curl.se/docs/CVE-2025-5025.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N |
|
| 1 |
| value |
Medium |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T16:19:34Z/ |
|
|
| url |
https://curl.se/docs/CVE-2025-5025.html |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-5025
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-176a-agbw-hqdy |
|
| 1 |
| url |
VCID-1k8f-qgcv-xkhb |
| vulnerability_id |
VCID-1k8f-qgcv-xkhb |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27782 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00469 |
| scoring_system |
epss |
| scoring_elements |
0.64546 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00469 |
| scoring_system |
epss |
| scoring_elements |
0.64552 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00469 |
| scoring_system |
epss |
| scoring_elements |
0.6454 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00469 |
| scoring_system |
epss |
| scoring_elements |
0.64512 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00469 |
| scoring_system |
epss |
| scoring_elements |
0.64484 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00469 |
| scoring_system |
epss |
| scoring_elements |
0.64515 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00469 |
| scoring_system |
epss |
| scoring_elements |
0.64472 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00469 |
| scoring_system |
epss |
| scoring_elements |
0.6452 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00469 |
| scoring_system |
epss |
| scoring_elements |
0.64536 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27782 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-27782
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1k8f-qgcv-xkhb |
|
| 2 |
| url |
VCID-1mf9-u8y1-zbb1 |
| vulnerability_id |
VCID-1mf9-u8y1-zbb1 |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which may allow attackers to bypass intended restrictions. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000101 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00624 |
| scoring_system |
epss |
| scoring_elements |
0.70084 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00624 |
| scoring_system |
epss |
| scoring_elements |
0.7019 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00624 |
| scoring_system |
epss |
| scoring_elements |
0.70088 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00624 |
| scoring_system |
epss |
| scoring_elements |
0.70135 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00624 |
| scoring_system |
epss |
| scoring_elements |
0.70151 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00624 |
| scoring_system |
epss |
| scoring_elements |
0.70175 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00624 |
| scoring_system |
epss |
| scoring_elements |
0.7016 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00624 |
| scoring_system |
epss |
| scoring_elements |
0.70147 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00624 |
| scoring_system |
epss |
| scoring_elements |
0.70096 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00624 |
| scoring_system |
epss |
| scoring_elements |
0.70111 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000101 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-1000101
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1mf9-u8y1-zbb1 |
|
| 3 |
| url |
VCID-26ju-84rx-c7b9 |
| vulnerability_id |
VCID-26ju-84rx-c7b9 |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which may allow attackers to bypass intended restrictions. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7407 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51472 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51614 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51563 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.5156 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51604 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51583 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51572 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51523 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51549 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51509 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7407 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7407
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-26ju-84rx-c7b9 |
|
| 4 |
| url |
VCID-26p8-15d6-kbb1 |
| vulnerability_id |
VCID-26p8-15d6-kbb1 |
| summary |
libcurl: Double Close of Eventfd in libcurl |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-0665 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04569 |
| scoring_system |
epss |
| scoring_elements |
0.89221 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.04569 |
| scoring_system |
epss |
| scoring_elements |
0.89164 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.04569 |
| scoring_system |
epss |
| scoring_elements |
0.89179 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.04569 |
| scoring_system |
epss |
| scoring_elements |
0.89182 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.04569 |
| scoring_system |
epss |
| scoring_elements |
0.892 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.04569 |
| scoring_system |
epss |
| scoring_elements |
0.89204 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.04569 |
| scoring_system |
epss |
| scoring_elements |
0.89214 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.04569 |
| scoring_system |
epss |
| scoring_elements |
0.8921 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.04569 |
| scoring_system |
epss |
| scoring_elements |
0.89208 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-0665 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-0665
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-26p8-15d6-kbb1 |
|
| 5 |
| url |
VCID-29n1-4u2b-tkgj |
| vulnerability_id |
VCID-29n1-4u2b-tkgj |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could result in a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16842 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31838 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31828 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31967 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.32009 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31881 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31909 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31913 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37128 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37101 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37148 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16842 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-16842
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-29n1-4u2b-tkgj |
|
| 6 |
| url |
VCID-2b39-ubrt-hkc6 |
| vulnerability_id |
VCID-2b39-ubrt-hkc6 |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which may lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-5436 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.11139 |
| scoring_system |
epss |
| scoring_elements |
0.93439 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.11139 |
| scoring_system |
epss |
| scoring_elements |
0.93473 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.11139 |
| scoring_system |
epss |
| scoring_elements |
0.93467 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.11139 |
| scoring_system |
epss |
| scoring_elements |
0.93464 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.11139 |
| scoring_system |
epss |
| scoring_elements |
0.93456 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.11139 |
| scoring_system |
epss |
| scoring_elements |
0.93447 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.11139 |
| scoring_system |
epss |
| scoring_elements |
0.93455 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.13273 |
| scoring_system |
epss |
| scoring_elements |
0.94177 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.13273 |
| scoring_system |
epss |
| scoring_elements |
0.94161 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-5436 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-5436
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2b39-ubrt-hkc6 |
|
| 7 |
| url |
VCID-2cx5-1qnw-uufj |
| vulnerability_id |
VCID-2cx5-1qnw-uufj |
| summary |
curl: curl: Authentication bypass due to incorrect connection reuse with Negotiate authentication |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-1965 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17246 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.17194 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16802 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16891 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16949 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00054 |
| scoring_system |
epss |
| scoring_elements |
0.16923 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19261 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19223 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19316 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-1965 |
|
| 2 |
| reference_url |
https://curl.se/docs/CVE-2026-1965.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
Medium |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:31:56Z/ |
|
|
| url |
https://curl.se/docs/CVE-2026-1965.html |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-1965
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2cx5-1qnw-uufj |
|
| 8 |
| url |
VCID-2f5z-vxsz-yqdv |
| vulnerability_id |
VCID-2f5z-vxsz-yqdv |
| summary |
A vulnerability in cURL may allow for arbitrary file access. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-0037 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.09542 |
| scoring_system |
epss |
| scoring_elements |
0.9286 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.09542 |
| scoring_system |
epss |
| scoring_elements |
0.9285 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.09542 |
| scoring_system |
epss |
| scoring_elements |
0.92823 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.09542 |
| scoring_system |
epss |
| scoring_elements |
0.9283 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.09542 |
| scoring_system |
epss |
| scoring_elements |
0.92834 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.09542 |
| scoring_system |
epss |
| scoring_elements |
0.92832 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.09542 |
| scoring_system |
epss |
| scoring_elements |
0.92841 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.09542 |
| scoring_system |
epss |
| scoring_elements |
0.92845 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-0037 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-0037
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2f5z-vxsz-yqdv |
|
| 9 |
| url |
VCID-2szj-xvgq-pkfr |
| vulnerability_id |
VCID-2szj-xvgq-pkfr |
| summary |
curl: QUIC certificate check bypass with wolfSSL |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-2379 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42735 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42672 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42699 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42641 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42692 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42704 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42726 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42691 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00205 |
| scoring_system |
epss |
| scoring_elements |
0.42674 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-2379 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://curl.se/docs/CVE-2024-2379.html |
| reference_id |
CVE-2024-2379.html |
| reference_type |
|
| scores |
| 0 |
| value |
6.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-2379.html |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-2379
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2szj-xvgq-pkfr |
|
| 10 |
| url |
VCID-2vwu-y316-gbb2 |
| vulnerability_id |
VCID-2vwu-y316-gbb2 |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-2466 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35479 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35517 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35542 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35424 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.3547 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35495 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35505 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35462 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.3544 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-2466 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://curl.se/docs/CVE-2024-2466.html |
| reference_id |
CVE-2024-2466.html |
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
|
| 1 |
| value |
Medium |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-2466.html |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-2466
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2vwu-y316-gbb2 |
|
| 11 |
| url |
VCID-2xmp-jc8v-bucb |
| vulnerability_id |
VCID-2xmp-jc8v-bucb |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-35252 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43804 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43787 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43779 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43736 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52356 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52298 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52348 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52332 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00289 |
| scoring_system |
epss |
| scoring_elements |
0.52318 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-35252 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-35252
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2xmp-jc8v-bucb |
|
| 12 |
| url |
VCID-36n6-qanf-nue8 |
| vulnerability_id |
VCID-36n6-qanf-nue8 |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which may allow attackers to bypass intended restrictions. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7468 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.65949 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.66059 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.65991 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.66019 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.65986 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.66036 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.66048 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.66067 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.66054 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00502 |
| scoring_system |
epss |
| scoring_elements |
0.66024 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7468 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7468
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-36n6-qanf-nue8 |
|
| 13 |
| url |
VCID-38mv-usbe-z7hd |
| vulnerability_id |
VCID-38mv-usbe-z7hd |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could result in the arbitrary execution of code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22901 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.56921 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57065 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57068 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.5707 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57081 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.5706 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57036 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57018 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.5704 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57017 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22901 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22901
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-38mv-usbe-z7hd |
|
| 14 |
| url |
VCID-3sy2-4f3g-zkac |
| vulnerability_id |
VCID-3sy2-4f3g-zkac |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27774 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53851 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53847 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.5383 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53814 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53749 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53775 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53748 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53801 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00306 |
| scoring_system |
epss |
| scoring_elements |
0.53799 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27774 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-27774
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3sy2-4f3g-zkac |
|
| 15 |
| url |
VCID-47qb-2qkw-1qej |
| vulnerability_id |
VCID-47qb-2qkw-1qej |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28321 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.53057 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.52966 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.52991 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.52959 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.53009 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.53003 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.53052 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.53037 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00297 |
| scoring_system |
epss |
| scoring_elements |
0.5302 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28321 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-28321
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-47qb-2qkw-1qej |
|
| 16 |
| url |
VCID-4drq-2td7-akbk |
| vulnerability_id |
VCID-4drq-2td7-akbk |
| summary |
cURL is vulnerable to a buffer overflow which could lead to the execution
of arbitrary code. |
| references |
| 0 |
| reference_url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-3185 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04852 |
| scoring_system |
epss |
| scoring_elements |
0.89553 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.04852 |
| scoring_system |
epss |
| scoring_elements |
0.89504 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.04852 |
| scoring_system |
epss |
| scoring_elements |
0.89547 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.04852 |
| scoring_system |
epss |
| scoring_elements |
0.89544 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.04852 |
| scoring_system |
epss |
| scoring_elements |
0.89508 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.04852 |
| scoring_system |
epss |
| scoring_elements |
0.89519 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.04852 |
| scoring_system |
epss |
| scoring_elements |
0.8952 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.04852 |
| scoring_system |
epss |
| scoring_elements |
0.89536 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.04852 |
| scoring_system |
epss |
| scoring_elements |
0.89539 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-3185 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-3185
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4drq-2td7-akbk |
|
| 17 |
| url |
VCID-4e1k-7bj9-hfch |
| vulnerability_id |
VCID-4e1k-7bj9-hfch |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-23914 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31922 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.32048 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.32088 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31911 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31963 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31992 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31995 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31955 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-23914 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-23914
|
| risk_score |
4.1 |
| exploitability |
0.5 |
| weighted_severity |
8.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4e1k-7bj9-hfch |
|
| 18 |
| url |
VCID-4gze-cwtp-2bgr |
| vulnerability_id |
VCID-4gze-cwtp-2bgr |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-23915 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13754 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13978 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14033 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13836 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1392 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13973 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1393 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13894 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13846 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-23915 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-23915
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4gze-cwtp-2bgr |
|
| 19 |
| url |
VCID-4mcy-vzmg-mbhz |
| vulnerability_id |
VCID-4mcy-vzmg-mbhz |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which might allow remote execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0036 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.10342 |
| scoring_system |
epss |
| scoring_elements |
0.93204 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.10342 |
| scoring_system |
epss |
| scoring_elements |
0.93159 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.10342 |
| scoring_system |
epss |
| scoring_elements |
0.93168 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.10342 |
| scoring_system |
epss |
| scoring_elements |
0.93173 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.10342 |
| scoring_system |
epss |
| scoring_elements |
0.93171 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.10342 |
| scoring_system |
epss |
| scoring_elements |
0.93179 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.10342 |
| scoring_system |
epss |
| scoring_elements |
0.93184 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.10342 |
| scoring_system |
epss |
| scoring_elements |
0.93189 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.10342 |
| scoring_system |
epss |
| scoring_elements |
0.93187 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.10342 |
| scoring_system |
epss |
| scoring_elements |
0.93188 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0036 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-0036
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4mcy-vzmg-mbhz |
|
| 20 |
| url |
VCID-4mk9-5buz-puh5 |
| vulnerability_id |
VCID-4mk9-5buz-puh5 |
| summary |
Multiple vulnerabilities have been discovered in cURL, the worst of
which could lead to man-in-the-middle attacks. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0139 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01203 |
| scoring_system |
epss |
| scoring_elements |
0.7896 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.01203 |
| scoring_system |
epss |
| scoring_elements |
0.78884 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01203 |
| scoring_system |
epss |
| scoring_elements |
0.78891 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01203 |
| scoring_system |
epss |
| scoring_elements |
0.78919 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01203 |
| scoring_system |
epss |
| scoring_elements |
0.78902 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01203 |
| scoring_system |
epss |
| scoring_elements |
0.78927 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01203 |
| scoring_system |
epss |
| scoring_elements |
0.78933 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01203 |
| scoring_system |
epss |
| scoring_elements |
0.78956 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01203 |
| scoring_system |
epss |
| scoring_elements |
0.78941 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01203 |
| scoring_system |
epss |
| scoring_elements |
0.78931 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0139 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-0139
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4mk9-5buz-puh5 |
|
| 21 |
| url |
VCID-4seq-hvbx-7fg8 |
| vulnerability_id |
VCID-4seq-hvbx-7fg8 |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46219 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42459 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42478 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.4244 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.4241 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.4466 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44703 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44716 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44713 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00221 |
| scoring_system |
epss |
| scoring_elements |
0.44723 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46219 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-46219
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4seq-hvbx-7fg8 |
|
| 22 |
| url |
VCID-549m-sm8g-cude |
| vulnerability_id |
VCID-549m-sm8g-cude |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which may allow attackers to bypass intended restrictions. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000099 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.72962 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73061 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.72974 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.72994 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.7297 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73007 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73021 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73046 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73025 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73019 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000099 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-1000099
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-549m-sm8g-cude |
|
| 23 |
| url |
VCID-56wg-yafz-gkgx |
| vulnerability_id |
VCID-56wg-yafz-gkgx |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22922 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.34891 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.3505 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35071 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35036 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35012 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35088 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35115 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.34995 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35039 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00146 |
| scoring_system |
epss |
| scoring_elements |
0.35067 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22922 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22922
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-56wg-yafz-gkgx |
|
| 24 |
| url |
VCID-5g4v-dyse-uucu |
| vulnerability_id |
VCID-5g4v-dyse-uucu |
| summary |
wcurl: wcurl: Arbitrary file placement via crafted URLs |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-11563 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0412 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04108 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04186 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04201 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0418 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04163 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04137 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04138 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04155 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-11563 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-11563
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5g4v-dyse-uucu |
|
| 25 |
| url |
VCID-5jan-pqf6-fyhr |
| vulnerability_id |
VCID-5jan-pqf6-fyhr |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8622 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01634 |
| scoring_system |
epss |
| scoring_elements |
0.81845 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01634 |
| scoring_system |
epss |
| scoring_elements |
0.81947 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.01634 |
| scoring_system |
epss |
| scoring_elements |
0.81901 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.01634 |
| scoring_system |
epss |
| scoring_elements |
0.81908 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.01634 |
| scoring_system |
epss |
| scoring_elements |
0.81927 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.01634 |
| scoring_system |
epss |
| scoring_elements |
0.81915 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.01634 |
| scoring_system |
epss |
| scoring_elements |
0.81911 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.01634 |
| scoring_system |
epss |
| scoring_elements |
0.81856 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.01634 |
| scoring_system |
epss |
| scoring_elements |
0.81879 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.01634 |
| scoring_system |
epss |
| scoring_elements |
0.81875 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8622 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-8622
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5jan-pqf6-fyhr |
|
| 26 |
| url |
VCID-5n7a-9j23-e7dj |
| vulnerability_id |
VCID-5n7a-9j23-e7dj |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could result in a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16839 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52577 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52647 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.5262 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52613 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52664 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52659 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52709 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00365 |
| scoring_system |
epss |
| scoring_elements |
0.58495 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00365 |
| scoring_system |
epss |
| scoring_elements |
0.58527 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00365 |
| scoring_system |
epss |
| scoring_elements |
0.58515 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16839 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-16839
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5n7a-9j23-e7dj |
|
| 27 |
| url |
VCID-5xp7-mcsa-uqd4 |
| vulnerability_id |
VCID-5xp7-mcsa-uqd4 |
| summary |
When doing TLS related transfers with reused easy or multi handles and
altering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally
reuse a CA store cached in memory for which the partial chain option was
reversed. Contrary to the user's wishes and expectations. This could make
libcurl find and accept a trust chain that it otherwise would not. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-14819 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13995 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13771 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13854 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13938 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13991 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13948 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13911 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13863 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1405 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-14819 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-14819
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5xp7-mcsa-uqd4 |
|
| 28 |
| url |
VCID-6ge5-86tg-dydf |
| vulnerability_id |
VCID-6ge5-86tg-dydf |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27779 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50731 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50686 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50728 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50705 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50654 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.5068 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50635 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.5069 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27779 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-27779
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6ge5-86tg-dydf |
|
| 29 |
| url |
VCID-6muy-xpdq-9kg8 |
| vulnerability_id |
VCID-6muy-xpdq-9kg8 |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8616 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0413 |
| scoring_system |
epss |
| scoring_elements |
0.88589 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0413 |
| scoring_system |
epss |
| scoring_elements |
0.88658 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.0413 |
| scoring_system |
epss |
| scoring_elements |
0.88598 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0413 |
| scoring_system |
epss |
| scoring_elements |
0.88616 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0413 |
| scoring_system |
epss |
| scoring_elements |
0.88617 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0413 |
| scoring_system |
epss |
| scoring_elements |
0.88635 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0413 |
| scoring_system |
epss |
| scoring_elements |
0.8864 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0413 |
| scoring_system |
epss |
| scoring_elements |
0.88652 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0413 |
| scoring_system |
epss |
| scoring_elements |
0.88645 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8616 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-8616
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6muy-xpdq-9kg8 |
|
| 30 |
| url |
VCID-6we4-n888-6qhe |
| vulnerability_id |
VCID-6we4-n888-6qhe |
| summary |
libcurl: Buffer Overflow in libcurl via zlib Integer Overflow |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-0725 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.6327 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63305 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63322 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63306 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63788 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63823 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63815 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63772 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-0725 |
|
| 2 |
| reference_url |
https://curl.se/docs/CVE-2025-0725.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-05T14:33:50Z/ |
|
|
| url |
https://curl.se/docs/CVE-2025-0725.html |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-0725
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6we4-n888-6qhe |
|
| 31 |
| url |
VCID-6yb7-t8qs-cbch |
| vulnerability_id |
VCID-6yb7-t8qs-cbch |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could result in a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000007 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03344 |
| scoring_system |
epss |
| scoring_elements |
0.87269 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.03344 |
| scoring_system |
epss |
| scoring_elements |
0.87259 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.03344 |
| scoring_system |
epss |
| scoring_elements |
0.87302 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.03344 |
| scoring_system |
epss |
| scoring_elements |
0.87283 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.03344 |
| scoring_system |
epss |
| scoring_elements |
0.87285 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.03871 |
| scoring_system |
epss |
| scoring_elements |
0.88245 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.03871 |
| scoring_system |
epss |
| scoring_elements |
0.88227 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.03871 |
| scoring_system |
epss |
| scoring_elements |
0.88238 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.03871 |
| scoring_system |
epss |
| scoring_elements |
0.88231 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000007 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-1000007
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6yb7-t8qs-cbch |
|
| 32 |
| url |
VCID-75nw-4e2d-zqgg |
| vulnerability_id |
VCID-75nw-4e2d-zqgg |
| summary |
curl: libcurl: ASN.1 date parser overread |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-7264 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.73947 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.73978 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.73943 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00796 |
| scoring_system |
epss |
| scoring_elements |
0.73973 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75437 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75409 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75429 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75407 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00882 |
| scoring_system |
epss |
| scoring_elements |
0.75396 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-7264 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://curl.se/docs/CVE-2024-7264.html |
| reference_id |
CVE-2024-7264.html |
| reference_type |
|
| scores |
| 0 |
| value |
6.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T20:05:41Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-7264.html |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-7264
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-75nw-4e2d-zqgg |
|
| 33 |
| url |
VCID-79sv-kzb5-hbc4 |
| vulnerability_id |
VCID-79sv-kzb5-hbc4 |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could result in a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3822 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.16566 |
| scoring_system |
epss |
| scoring_elements |
0.94879 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.16566 |
| scoring_system |
epss |
| scoring_elements |
0.94923 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.16566 |
| scoring_system |
epss |
| scoring_elements |
0.94888 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.16566 |
| scoring_system |
epss |
| scoring_elements |
0.94891 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.16566 |
| scoring_system |
epss |
| scoring_elements |
0.94893 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.16566 |
| scoring_system |
epss |
| scoring_elements |
0.94902 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.16566 |
| scoring_system |
epss |
| scoring_elements |
0.94907 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.16566 |
| scoring_system |
epss |
| scoring_elements |
0.94911 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.16566 |
| scoring_system |
epss |
| scoring_elements |
0.94913 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.16566 |
| scoring_system |
epss |
| scoring_elements |
0.94916 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3822 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-3822
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-79sv-kzb5-hbc4 |
|
| 34 |
| url |
VCID-7c8e-eaqy-akeu |
| vulnerability_id |
VCID-7c8e-eaqy-akeu |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3153 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0976 |
| scoring_system |
epss |
| scoring_elements |
0.9296 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.0976 |
| scoring_system |
epss |
| scoring_elements |
0.92922 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0976 |
| scoring_system |
epss |
| scoring_elements |
0.9293 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0976 |
| scoring_system |
epss |
| scoring_elements |
0.92934 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0976 |
| scoring_system |
epss |
| scoring_elements |
0.92933 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0976 |
| scoring_system |
epss |
| scoring_elements |
0.92941 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0976 |
| scoring_system |
epss |
| scoring_elements |
0.92945 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0976 |
| scoring_system |
epss |
| scoring_elements |
0.9295 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0976 |
| scoring_system |
epss |
| scoring_elements |
0.92949 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3153 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3153
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7c8e-eaqy-akeu |
|
| 35 |
| url |
VCID-7srk-hshe-h3f4 |
| vulnerability_id |
VCID-7srk-hshe-h3f4 |
| summary |
Improper Authentication
An authentication bypass vulnerability exists in libcurl v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-27538 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03579 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03588 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03622 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.036 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03599 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03574 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05545 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05601 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05595 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-27538 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-27538
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
6.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7srk-hshe-h3f4 |
|
| 36 |
| url |
VCID-7vt9-pf5q-uqb6 |
| vulnerability_id |
VCID-7vt9-pf5q-uqb6 |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could result in a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000301 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02712 |
| scoring_system |
epss |
| scoring_elements |
0.85931 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.02761 |
| scoring_system |
epss |
| scoring_elements |
0.85984 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.02761 |
| scoring_system |
epss |
| scoring_elements |
0.85957 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.02761 |
| scoring_system |
epss |
| scoring_elements |
0.85968 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.02761 |
| scoring_system |
epss |
| scoring_elements |
0.8602 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.02761 |
| scoring_system |
epss |
| scoring_elements |
0.86025 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.02761 |
| scoring_system |
epss |
| scoring_elements |
0.86027 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02761 |
| scoring_system |
epss |
| scoring_elements |
0.86013 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.02761 |
| scoring_system |
epss |
| scoring_elements |
0.86003 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000301 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-1000301
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7vt9-pf5q-uqb6 |
|
| 37 |
| url |
VCID-7xxh-66ys-4bhw |
| vulnerability_id |
VCID-7xxh-66ys-4bhw |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5419 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01968 |
| scoring_system |
epss |
| scoring_elements |
0.83461 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01968 |
| scoring_system |
epss |
| scoring_elements |
0.8356 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.01968 |
| scoring_system |
epss |
| scoring_elements |
0.83529 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.01968 |
| scoring_system |
epss |
| scoring_elements |
0.83526 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.01968 |
| scoring_system |
epss |
| scoring_elements |
0.83474 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.01968 |
| scoring_system |
epss |
| scoring_elements |
0.83488 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.01968 |
| scoring_system |
epss |
| scoring_elements |
0.83487 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.01968 |
| scoring_system |
epss |
| scoring_elements |
0.83511 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.01968 |
| scoring_system |
epss |
| scoring_elements |
0.83521 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.01968 |
| scoring_system |
epss |
| scoring_elements |
0.83535 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5419 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-5419
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7xxh-66ys-4bhw |
|
| 38 |
| url |
VCID-87qu-j64w-p7fj |
| vulnerability_id |
VCID-87qu-j64w-p7fj |
| summary |
unchecked ssl certificate host name |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4545 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57761 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57618 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57702 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57724 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57699 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57754 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57756 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57772 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57751 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57731 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4545 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-4545
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-87qu-j64w-p7fj |
|
| 39 |
| url |
VCID-8m6a-ej6a-g3df |
| vulnerability_id |
VCID-8m6a-ej6a-g3df |
| summary |
curl: freeing stack buffer in utf8asn1str |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-6197 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01302 |
| scoring_system |
epss |
| scoring_elements |
0.79765 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.01302 |
| scoring_system |
epss |
| scoring_elements |
0.79695 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01302 |
| scoring_system |
epss |
| scoring_elements |
0.79716 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01302 |
| scoring_system |
epss |
| scoring_elements |
0.79701 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01302 |
| scoring_system |
epss |
| scoring_elements |
0.7973 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01302 |
| scoring_system |
epss |
| scoring_elements |
0.79737 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.01302 |
| scoring_system |
epss |
| scoring_elements |
0.79759 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01302 |
| scoring_system |
epss |
| scoring_elements |
0.79743 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-6197 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://curl.se/docs/CVE-2024-6197.html |
| reference_id |
CVE-2024-6197.html |
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
Medium |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-24T18:42:30Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-6197.html |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-6197
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8m6a-ej6a-g3df |
|
| 40 |
| url |
VCID-8zks-th64-33b8 |
| vulnerability_id |
VCID-8zks-th64-33b8 |
| summary |
curl: curl: Unauthorized access due to improper HTTP proxy connection reuse |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3784 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03044 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03051 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03081 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03056 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03053 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03037 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03659 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03709 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03683 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3784 |
|
| 2 |
| reference_url |
https://curl.se/docs/CVE-2026-3784.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:48:38Z/ |
|
|
| url |
https://curl.se/docs/CVE-2026-3784.html |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-3784
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8zks-th64-33b8 |
|
| 41 |
| url |
VCID-9cbd-x468-rkaw |
| vulnerability_id |
VCID-9cbd-x468-rkaw |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could result in a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16840 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00225 |
| scoring_system |
epss |
| scoring_elements |
0.451 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.5382 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53718 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53745 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53717 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.5377 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53767 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53815 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53798 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00305 |
| scoring_system |
epss |
| scoring_elements |
0.53783 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16840 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-16840
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9cbd-x468-rkaw |
|
| 42 |
| url |
VCID-9ggp-5wfj-ufcq |
| vulnerability_id |
VCID-9ggp-5wfj-ufcq |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-43552 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42409 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42428 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42458 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42397 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42447 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42455 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.42477 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00203 |
| scoring_system |
epss |
| scoring_elements |
0.4244 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-43552 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-43552
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9ggp-5wfj-ufcq |
|
| 43 |
| url |
VCID-9mjz-apkm-g7h1 |
| vulnerability_id |
VCID-9mjz-apkm-g7h1 |
| summary |
libcurl: curl: QUIC certificate check skip with wolfSSL |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-4947 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22628 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22731 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22775 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22565 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22641 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22692 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.2271 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22671 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22613 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-4947 |
|
| 2 |
| reference_url |
https://curl.se/docs/CVE-2025-4947.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
|
| 1 |
| value |
Medium |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T13:57:59Z/ |
|
|
| url |
https://curl.se/docs/CVE-2025-4947.html |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-4947
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9mjz-apkm-g7h1 |
|
| 44 |
| url |
VCID-9nak-pscy-e7gs |
| vulnerability_id |
VCID-9nak-pscy-e7gs |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-32221 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.82218 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.82185 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.01681 |
| scoring_system |
epss |
| scoring_elements |
0.82179 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.02591 |
| scoring_system |
epss |
| scoring_elements |
0.8553 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.02591 |
| scoring_system |
epss |
| scoring_elements |
0.85547 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.02753 |
| scoring_system |
epss |
| scoring_elements |
0.85998 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02753 |
| scoring_system |
epss |
| scoring_elements |
0.86012 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02753 |
| scoring_system |
epss |
| scoring_elements |
0.85988 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.02753 |
| scoring_system |
epss |
| scoring_elements |
0.85969 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-32221 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-32221
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9nak-pscy-e7gs |
|
| 45 |
| url |
VCID-9q2w-yxvk-pbhd |
| vulnerability_id |
VCID-9q2w-yxvk-pbhd |
| summary |
cURL is vulnerable to local arbitrary code execution via buffer overflow
due to the insecure parsing of URLs. |
| references |
| 0 |
| reference_url |
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.16/SCOSA-2006.16.txt |
| reference_id |
|
| reference_type |
|
| scores |
|
| url |
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.16/SCOSA-2006.16.txt |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-4077 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50143 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50051 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50101 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50098 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50085 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50113 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50063 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50117 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.5011 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50128 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-4077 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-4077
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9q2w-yxvk-pbhd |
|
| 46 |
| url |
VCID-a3v7-ptf1-6qgd |
| vulnerability_id |
VCID-a3v7-ptf1-6qgd |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7141 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00524 |
| scoring_system |
epss |
| scoring_elements |
0.66857 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00524 |
| scoring_system |
epss |
| scoring_elements |
0.66895 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00524 |
| scoring_system |
epss |
| scoring_elements |
0.66921 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00524 |
| scoring_system |
epss |
| scoring_elements |
0.66943 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00524 |
| scoring_system |
epss |
| scoring_elements |
0.66957 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00524 |
| scoring_system |
epss |
| scoring_elements |
0.66977 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00524 |
| scoring_system |
epss |
| scoring_elements |
0.66963 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00524 |
| scoring_system |
epss |
| scoring_elements |
0.66932 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00524 |
| scoring_system |
epss |
| scoring_elements |
0.66964 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7141 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-7141
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a3v7-ptf1-6qgd |
|
| 47 |
| url |
VCID-a9b6-m25r-kygw |
| vulnerability_id |
VCID-a9b6-m25r-kygw |
| summary |
The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, makes it easier for remote attackers to conduct man-in-the-middle attacks via a crafted wildcard SAN in a server certificate, as demonstrated by "*.com." |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-9952 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77078 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77035 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77063 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77042 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77037 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.76977 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.76983 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77012 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.76993 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77025 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-9952 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-9952
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a9b6-m25r-kygw |
|
| 48 |
| url |
VCID-ac6r-spds-qbf5 |
| vulnerability_id |
VCID-ac6r-spds-qbf5 |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which may lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-5435 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38366 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38402 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38441 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38449 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38464 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38427 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38503 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.38528 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00172 |
| scoring_system |
epss |
| scoring_elements |
0.3839 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-5435 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-5435
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ac6r-spds-qbf5 |
|
| 49 |
| url |
VCID-ae59-w7a1-7keg |
| vulnerability_id |
VCID-ae59-w7a1-7keg |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which may allow execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000254 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01178 |
| scoring_system |
epss |
| scoring_elements |
0.78736 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.01178 |
| scoring_system |
epss |
| scoring_elements |
0.78727 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.01318 |
| scoring_system |
epss |
| scoring_elements |
0.79891 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.01348 |
| scoring_system |
epss |
| scoring_elements |
0.80036 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.01348 |
| scoring_system |
epss |
| scoring_elements |
0.80043 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.01348 |
| scoring_system |
epss |
| scoring_elements |
0.80064 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.01348 |
| scoring_system |
epss |
| scoring_elements |
0.80053 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.01348 |
| scoring_system |
epss |
| scoring_elements |
0.80081 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.01348 |
| scoring_system |
epss |
| scoring_elements |
0.80089 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.01348 |
| scoring_system |
epss |
| scoring_elements |
0.80109 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000254 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-1000254
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ae59-w7a1-7keg |
|
| 50 |
| url |
VCID-amgy-dw6h-6ydf |
| vulnerability_id |
VCID-amgy-dw6h-6ydf |
| summary |
curl: curl: Arbitrary code execution or Denial of Service via use-after-free in SMB request handling |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3805 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11817 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1188 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11805 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11752 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11667 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11837 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12821 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12966 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12921 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3805 |
|
| 2 |
| reference_url |
https://curl.se/docs/CVE-2026-3805.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
Medium |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:45:10Z/ |
|
|
| url |
https://curl.se/docs/CVE-2026-3805.html |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-3805
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-amgy-dw6h-6ydf |
|
| 51 |
| url |
VCID-arjz-67yz-wkg9 |
| vulnerability_id |
VCID-arjz-67yz-wkg9 |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-27533 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40463 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40439 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40465 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40389 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.4044 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40451 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40472 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40434 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00186 |
| scoring_system |
epss |
| scoring_elements |
0.40415 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-27533 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-27533
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-arjz-67yz-wkg9 |
|
| 52 |
| url |
VCID-aua9-4frt-xugf |
| vulnerability_id |
VCID-aua9-4frt-xugf |
| summary |
curl: libcurl: Curl out of bounds read for cookie path |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-9086 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10241 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10138 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10177 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14098 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14303 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14356 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14302 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14264 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14208 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-9086 |
|
| 2 |
| reference_url |
https://curl.se/docs/CVE-2025-9086.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-12T17:15:47Z/ |
|
|
| url |
https://curl.se/docs/CVE-2025-9086.html |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-9086
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-aua9-4frt-xugf |
|
| 53 |
| url |
VCID-b2ef-zj3u-rbhy |
| vulnerability_id |
VCID-b2ef-zj3u-rbhy |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-0755 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00412 |
| scoring_system |
epss |
| scoring_elements |
0.61492 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00412 |
| scoring_system |
epss |
| scoring_elements |
0.61471 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00412 |
| scoring_system |
epss |
| scoring_elements |
0.61452 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00412 |
| scoring_system |
epss |
| scoring_elements |
0.61326 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00412 |
| scoring_system |
epss |
| scoring_elements |
0.61402 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00412 |
| scoring_system |
epss |
| scoring_elements |
0.61431 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00412 |
| scoring_system |
epss |
| scoring_elements |
0.61401 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00412 |
| scoring_system |
epss |
| scoring_elements |
0.61447 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00412 |
| scoring_system |
epss |
| scoring_elements |
0.61463 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00412 |
| scoring_system |
epss |
| scoring_elements |
0.61484 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-0755 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-0755
|
| risk_score |
3.3 |
| exploitability |
0.5 |
| weighted_severity |
6.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b2ef-zj3u-rbhy |
|
| 54 |
| url |
VCID-b69q-9yrr-myf7 |
| vulnerability_id |
VCID-b69q-9yrr-myf7 |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-0853 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.3637 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36442 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36475 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.3631 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36358 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36378 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36385 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.3635 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36328 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-0853 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://curl.se/docs/CVE-2024-0853.html |
| reference_id |
CVE-2024-0853.html |
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:54:33Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-0853.html |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-0853
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b69q-9yrr-myf7 |
|
| 55 |
| url |
VCID-bb2f-7qrm-1kca |
| vulnerability_id |
VCID-bb2f-7qrm-1kca |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27781 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23006 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23085 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23049 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.22992 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23104 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23149 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.2294 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23013 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00077 |
| scoring_system |
epss |
| scoring_elements |
0.23066 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27781 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-27781
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bb2f-7qrm-1kca |
|
| 56 |
| url |
VCID-bdrx-sm6b-sken |
| vulnerability_id |
VCID-bdrx-sm6b-sken |
| summary |
Multiple vulnerabilities have been found in cURL, allowing
attackers to execute arbitrary code or cause Denial of Service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6422 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48719 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.486 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48641 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48663 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48615 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48669 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48666 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48684 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48658 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.4867 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6422 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-6422
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bdrx-sm6b-sken |
|
| 57 |
| url |
VCID-bdy2-8gub-tfe6 |
| vulnerability_id |
VCID-bdy2-8gub-tfe6 |
| summary |
Double Free
When sending data to an MQTT server, libcurl could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22945 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57605 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57712 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57748 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57719 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57738 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57759 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57743 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57741 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.5769 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00353 |
| scoring_system |
epss |
| scoring_elements |
0.57686 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22945 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22945
|
| risk_score |
4.1 |
| exploitability |
0.5 |
| weighted_severity |
8.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bdy2-8gub-tfe6 |
|
| 58 |
| url |
VCID-bgtv-jrna-9yb3 |
| vulnerability_id |
VCID-bgtv-jrna-9yb3 |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5421 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01296 |
| scoring_system |
epss |
| scoring_elements |
0.79647 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01296 |
| scoring_system |
epss |
| scoring_elements |
0.79723 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.01296 |
| scoring_system |
epss |
| scoring_elements |
0.79702 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.01296 |
| scoring_system |
epss |
| scoring_elements |
0.79695 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.01296 |
| scoring_system |
epss |
| scoring_elements |
0.79653 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.01296 |
| scoring_system |
epss |
| scoring_elements |
0.79675 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.01296 |
| scoring_system |
epss |
| scoring_elements |
0.79661 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.01296 |
| scoring_system |
epss |
| scoring_elements |
0.7969 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.01296 |
| scoring_system |
epss |
| scoring_elements |
0.79697 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.01296 |
| scoring_system |
epss |
| scoring_elements |
0.79718 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5421 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-5421
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bgtv-jrna-9yb3 |
|
| 59 |
| url |
VCID-bhvd-ntxz-dkg4 |
| vulnerability_id |
VCID-bhvd-ntxz-dkg4 |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which may allow execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-8816 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63733 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63848 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63794 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63821 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63778 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63829 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63846 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.6386 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00454 |
| scoring_system |
epss |
| scoring_elements |
0.63812 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-8816 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-8816
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bhvd-ntxz-dkg4 |
|
| 60 |
| url |
VCID-bv57-gvfs-qfhj |
| vulnerability_id |
VCID-bv57-gvfs-qfhj |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could result in a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000121 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03154 |
| scoring_system |
epss |
| scoring_elements |
0.86848 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.03154 |
| scoring_system |
epss |
| scoring_elements |
0.86919 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.03154 |
| scoring_system |
epss |
| scoring_elements |
0.86858 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.03154 |
| scoring_system |
epss |
| scoring_elements |
0.86877 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.03154 |
| scoring_system |
epss |
| scoring_elements |
0.86872 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.03154 |
| scoring_system |
epss |
| scoring_elements |
0.86891 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.03154 |
| scoring_system |
epss |
| scoring_elements |
0.869 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.03154 |
| scoring_system |
epss |
| scoring_elements |
0.86913 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.03154 |
| scoring_system |
epss |
| scoring_elements |
0.86908 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.03154 |
| scoring_system |
epss |
| scoring_elements |
0.86902 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000121 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-1000121
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bv57-gvfs-qfhj |
|
| 61 |
| url |
VCID-bvgs-71kb-mbcx |
| vulnerability_id |
VCID-bvgs-71kb-mbcx |
| summary |
security flaw |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2005-0490 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02576 |
| scoring_system |
epss |
| scoring_elements |
0.85577 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.02576 |
| scoring_system |
epss |
| scoring_elements |
0.8556 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.02576 |
| scoring_system |
epss |
| scoring_elements |
0.85557 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.02576 |
| scoring_system |
epss |
| scoring_elements |
0.85553 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.02576 |
| scoring_system |
epss |
| scoring_elements |
0.85483 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.02576 |
| scoring_system |
epss |
| scoring_elements |
0.85495 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.02576 |
| scoring_system |
epss |
| scoring_elements |
0.85512 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.02576 |
| scoring_system |
epss |
| scoring_elements |
0.85516 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.02576 |
| scoring_system |
epss |
| scoring_elements |
0.85536 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.02576 |
| scoring_system |
epss |
| scoring_elements |
0.85545 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2005-0490 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2005-0490
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
7.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bvgs-71kb-mbcx |
|
| 62 |
| url |
VCID-bz4u-6rft-s3a8 |
| vulnerability_id |
VCID-bz4u-6rft-s3a8 |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-38039 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.12305 |
| scoring_system |
epss |
| scoring_elements |
0.93887 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.12305 |
| scoring_system |
epss |
| scoring_elements |
0.93835 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.12305 |
| scoring_system |
epss |
| scoring_elements |
0.93845 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.12305 |
| scoring_system |
epss |
| scoring_elements |
0.93847 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.12305 |
| scoring_system |
epss |
| scoring_elements |
0.93856 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.12305 |
| scoring_system |
epss |
| scoring_elements |
0.9386 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.12305 |
| scoring_system |
epss |
| scoring_elements |
0.93865 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-38039 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-38039
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bz4u-6rft-s3a8 |
|
| 63 |
| url |
VCID-c2na-7q9e-47am |
| vulnerability_id |
VCID-c2na-7q9e-47am |
| summary |
information disclosure |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0015 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01396 |
| scoring_system |
epss |
| scoring_elements |
0.80422 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.01396 |
| scoring_system |
epss |
| scoring_elements |
0.80393 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.01396 |
| scoring_system |
epss |
| scoring_elements |
0.80342 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.01396 |
| scoring_system |
epss |
| scoring_elements |
0.80348 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.01396 |
| scoring_system |
epss |
| scoring_elements |
0.80368 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.01396 |
| scoring_system |
epss |
| scoring_elements |
0.80357 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.01396 |
| scoring_system |
epss |
| scoring_elements |
0.80386 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.01396 |
| scoring_system |
epss |
| scoring_elements |
0.80396 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.01396 |
| scoring_system |
epss |
| scoring_elements |
0.80415 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.01396 |
| scoring_system |
epss |
| scoring_elements |
0.804 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0015 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-0015
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c2na-7q9e-47am |
|
| 64 |
| url |
VCID-c6dk-7gj6-7far |
| vulnerability_id |
VCID-c6dk-7gj6-7far |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8623 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74617 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74699 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74621 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74647 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74653 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74667 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.7469 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.7467 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00837 |
| scoring_system |
epss |
| scoring_elements |
0.74662 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8623 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-8623
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c6dk-7gj6-7far |
|
| 65 |
| url |
VCID-cbah-e86c-w3fj |
| vulnerability_id |
VCID-cbah-e86c-w3fj |
| summary |
Improper Authentication
An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-27535 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20226 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20386 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20446 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.2017 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20251 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20311 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20341 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20295 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20236 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-27535 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-27535
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cbah-e86c-w3fj |
|
| 66 |
| url |
VCID-cbph-fu9d-gbah |
| vulnerability_id |
VCID-cbph-fu9d-gbah |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could result in a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000122 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01942 |
| scoring_system |
epss |
| scoring_elements |
0.83368 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01942 |
| scoring_system |
epss |
| scoring_elements |
0.8347 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.01942 |
| scoring_system |
epss |
| scoring_elements |
0.83381 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01942 |
| scoring_system |
epss |
| scoring_elements |
0.83396 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01942 |
| scoring_system |
epss |
| scoring_elements |
0.8342 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01942 |
| scoring_system |
epss |
| scoring_elements |
0.8343 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01942 |
| scoring_system |
epss |
| scoring_elements |
0.83445 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01942 |
| scoring_system |
epss |
| scoring_elements |
0.83439 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01942 |
| scoring_system |
epss |
| scoring_elements |
0.83435 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000122 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-1000122
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cbph-fu9d-gbah |
|
| 67 |
| url |
VCID-cp4n-p2z3-43b4 |
| vulnerability_id |
VCID-cp4n-p2z3-43b4 |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could result in information disclosure or data loss. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8177 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05444 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05476 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05545 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05532 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05526 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05479 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05514 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05549 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.0557 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8177 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8177
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cp4n-p2z3-43b4 |
|
| 68 |
| url |
VCID-d3s1-3qs7-2uhw |
| vulnerability_id |
VCID-d3s1-3qs7-2uhw |
| summary |
curl: Cipher settings shared for all connections when using schannel TLS backed |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22897 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73845 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73936 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73903 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73894 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73855 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.7388 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73851 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73886 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73899 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73921 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22897 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22897
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d3s1-3qs7-2uhw |
|
| 69 |
| url |
VCID-ddgz-rczw-jqfw |
| vulnerability_id |
VCID-ddgz-rczw-jqfw |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28320 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67581 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67504 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67526 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67556 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.6757 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67592 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67579 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00538 |
| scoring_system |
epss |
| scoring_elements |
0.67546 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28320 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-28320
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ddgz-rczw-jqfw |
|
| 70 |
| url |
VCID-dgtq-eaav-jyhf |
| vulnerability_id |
VCID-dgtq-eaav-jyhf |
| summary |
Out-of-bounds Write
A buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that allows an attacker to cause a denial of service or worse. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000120 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0154 |
| scoring_system |
epss |
| scoring_elements |
0.81402 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.0154 |
| scoring_system |
epss |
| scoring_elements |
0.81302 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0154 |
| scoring_system |
epss |
| scoring_elements |
0.81312 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0154 |
| scoring_system |
epss |
| scoring_elements |
0.81334 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0154 |
| scoring_system |
epss |
| scoring_elements |
0.81332 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0154 |
| scoring_system |
epss |
| scoring_elements |
0.81361 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0154 |
| scoring_system |
epss |
| scoring_elements |
0.81366 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0154 |
| scoring_system |
epss |
| scoring_elements |
0.81387 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0154 |
| scoring_system |
epss |
| scoring_elements |
0.81372 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0154 |
| scoring_system |
epss |
| scoring_elements |
0.81365 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000120 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-1000120, GHSA-674j-7m97-j2p9
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dgtq-eaav-jyhf |
|
| 71 |
| url |
VCID-dhrf-2sz5-3bhf |
| vulnerability_id |
VCID-dhrf-2sz5-3bhf |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which may lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-5481 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03017 |
| scoring_system |
epss |
| scoring_elements |
0.86623 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.03017 |
| scoring_system |
epss |
| scoring_elements |
0.86617 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.03017 |
| scoring_system |
epss |
| scoring_elements |
0.8661 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.04042 |
| scoring_system |
epss |
| scoring_elements |
0.88452 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.04042 |
| scoring_system |
epss |
| scoring_elements |
0.8846 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.04042 |
| scoring_system |
epss |
| scoring_elements |
0.88476 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.04042 |
| scoring_system |
epss |
| scoring_elements |
0.88479 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.04042 |
| scoring_system |
epss |
| scoring_elements |
0.88497 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.04042 |
| scoring_system |
epss |
| scoring_elements |
0.88503 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.04042 |
| scoring_system |
epss |
| scoring_elements |
0.88514 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-5481 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-5481
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dhrf-2sz5-3bhf |
|
| 72 |
| url |
VCID-dj5e-62rt-hkex |
| vulnerability_id |
VCID-dj5e-62rt-hkex |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which might allow remote execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0734 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04759 |
| scoring_system |
epss |
| scoring_elements |
0.89464 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.04759 |
| scoring_system |
epss |
| scoring_elements |
0.8941 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.04759 |
| scoring_system |
epss |
| scoring_elements |
0.89415 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.04759 |
| scoring_system |
epss |
| scoring_elements |
0.89425 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.04759 |
| scoring_system |
epss |
| scoring_elements |
0.89427 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.04759 |
| scoring_system |
epss |
| scoring_elements |
0.89443 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.04759 |
| scoring_system |
epss |
| scoring_elements |
0.89446 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.04759 |
| scoring_system |
epss |
| scoring_elements |
0.89455 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.04759 |
| scoring_system |
epss |
| scoring_elements |
0.89453 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.04759 |
| scoring_system |
epss |
| scoring_elements |
0.89449 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-0734 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-0734
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dj5e-62rt-hkex |
|
| 73 |
| url |
VCID-drkp-q9r5-ukcm |
| vulnerability_id |
VCID-drkp-q9r5-ukcm |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which may allow execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-8818 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00559 |
| scoring_system |
epss |
| scoring_elements |
0.68167 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00559 |
| scoring_system |
epss |
| scoring_elements |
0.6819 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00559 |
| scoring_system |
epss |
| scoring_elements |
0.68236 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00559 |
| scoring_system |
epss |
| scoring_elements |
0.68185 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00559 |
| scoring_system |
epss |
| scoring_elements |
0.68207 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00559 |
| scoring_system |
epss |
| scoring_elements |
0.68251 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00729 |
| scoring_system |
epss |
| scoring_elements |
0.72682 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00729 |
| scoring_system |
epss |
| scoring_elements |
0.72666 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00729 |
| scoring_system |
epss |
| scoring_elements |
0.72649 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00729 |
| scoring_system |
epss |
| scoring_elements |
0.72639 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-8818 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-8818
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-drkp-q9r5-ukcm |
|
| 74 |
| url |
VCID-dzzd-afgu-3fcy |
| vulnerability_id |
VCID-dzzd-afgu-3fcy |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-8150 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0123 |
| scoring_system |
epss |
| scoring_elements |
0.79187 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.0123 |
| scoring_system |
epss |
| scoring_elements |
0.79112 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0123 |
| scoring_system |
epss |
| scoring_elements |
0.79119 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0123 |
| scoring_system |
epss |
| scoring_elements |
0.79144 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0123 |
| scoring_system |
epss |
| scoring_elements |
0.79129 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0123 |
| scoring_system |
epss |
| scoring_elements |
0.79153 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0123 |
| scoring_system |
epss |
| scoring_elements |
0.79161 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.0123 |
| scoring_system |
epss |
| scoring_elements |
0.79185 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0123 |
| scoring_system |
epss |
| scoring_elements |
0.7917 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-8150 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-8150
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dzzd-afgu-3fcy |
|
| 75 |
| url |
VCID-e1yx-dxa6-1bba |
| vulnerability_id |
VCID-e1yx-dxa6-1bba |
| summary |
Multiple vulnerabilities have been found in the Oracle JRE/JDK,
allowing attackers to cause unspecified impact. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3389 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03832 |
| scoring_system |
epss |
| scoring_elements |
0.88174 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.03832 |
| scoring_system |
epss |
| scoring_elements |
0.8816 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.03832 |
| scoring_system |
epss |
| scoring_elements |
0.88099 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.03832 |
| scoring_system |
epss |
| scoring_elements |
0.88108 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.03832 |
| scoring_system |
epss |
| scoring_elements |
0.88124 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.03832 |
| scoring_system |
epss |
| scoring_elements |
0.88131 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.03832 |
| scoring_system |
epss |
| scoring_elements |
0.8815 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.03832 |
| scoring_system |
epss |
| scoring_elements |
0.88156 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.03832 |
| scoring_system |
epss |
| scoring_elements |
0.88165 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.03832 |
| scoring_system |
epss |
| scoring_elements |
0.88159 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3389 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-3389
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e1yx-dxa6-1bba |
|
| 76 |
| url |
VCID-e58m-g37d-9fd6 |
| vulnerability_id |
VCID-e58m-g37d-9fd6 |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8624 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01346 |
| scoring_system |
epss |
| scoring_elements |
0.80023 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01346 |
| scoring_system |
epss |
| scoring_elements |
0.80102 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.01346 |
| scoring_system |
epss |
| scoring_elements |
0.8003 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01346 |
| scoring_system |
epss |
| scoring_elements |
0.80052 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01346 |
| scoring_system |
epss |
| scoring_elements |
0.80042 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01346 |
| scoring_system |
epss |
| scoring_elements |
0.80069 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01346 |
| scoring_system |
epss |
| scoring_elements |
0.80078 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01346 |
| scoring_system |
epss |
| scoring_elements |
0.80098 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01346 |
| scoring_system |
epss |
| scoring_elements |
0.80082 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01346 |
| scoring_system |
epss |
| scoring_elements |
0.80073 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8624 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-8624
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e58m-g37d-9fd6 |
|
| 77 |
| url |
VCID-eap9-v2gp-fqgh |
| vulnerability_id |
VCID-eap9-v2gp-fqgh |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-3739 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01068 |
| scoring_system |
epss |
| scoring_elements |
0.77748 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.01068 |
| scoring_system |
epss |
| scoring_elements |
0.77712 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.01068 |
| scoring_system |
epss |
| scoring_elements |
0.77711 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.01068 |
| scoring_system |
epss |
| scoring_elements |
0.77652 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.01068 |
| scoring_system |
epss |
| scoring_elements |
0.77659 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.01068 |
| scoring_system |
epss |
| scoring_elements |
0.77686 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.01068 |
| scoring_system |
epss |
| scoring_elements |
0.77669 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.01068 |
| scoring_system |
epss |
| scoring_elements |
0.77696 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.01068 |
| scoring_system |
epss |
| scoring_elements |
0.77702 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.01068 |
| scoring_system |
epss |
| scoring_elements |
0.77728 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-3739 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-3739
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-eap9-v2gp-fqgh |
|
| 78 |
| url |
VCID-eer3-29q8-sbgq |
| vulnerability_id |
VCID-eer3-29q8-sbgq |
| summary |
security update |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3707 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43397 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43337 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43274 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43331 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43359 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43296 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43348 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43363 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43384 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00209 |
| scoring_system |
epss |
| scoring_elements |
0.43352 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3707 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3707
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-eer3-29q8-sbgq |
|
| 79 |
| url |
VCID-ej47-4dcu-5fhy |
| vulnerability_id |
VCID-ej47-4dcu-5fhy |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-42915 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00467 |
| scoring_system |
epss |
| scoring_elements |
0.64442 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00467 |
| scoring_system |
epss |
| scoring_elements |
0.64436 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00467 |
| scoring_system |
epss |
| scoring_elements |
0.64407 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00625 |
| scoring_system |
epss |
| scoring_elements |
0.70143 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00625 |
| scoring_system |
epss |
| scoring_elements |
0.70128 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00812 |
| scoring_system |
epss |
| scoring_elements |
0.74272 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00812 |
| scoring_system |
epss |
| scoring_elements |
0.7425 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00812 |
| scoring_system |
epss |
| scoring_elements |
0.74235 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00812 |
| scoring_system |
epss |
| scoring_elements |
0.74203 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-42915 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-42915
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ej47-4dcu-5fhy |
|
| 80 |
| url |
VCID-ekav-zg3k-v3ea |
| vulnerability_id |
VCID-ekav-zg3k-v3ea |
| summary |
curl: cookies accepted for TLDs |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3620 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01306 |
| scoring_system |
epss |
| scoring_elements |
0.79796 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.01306 |
| scoring_system |
epss |
| scoring_elements |
0.79769 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.01306 |
| scoring_system |
epss |
| scoring_elements |
0.7972 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.01306 |
| scoring_system |
epss |
| scoring_elements |
0.79728 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.01306 |
| scoring_system |
epss |
| scoring_elements |
0.79749 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.01306 |
| scoring_system |
epss |
| scoring_elements |
0.79735 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.01306 |
| scoring_system |
epss |
| scoring_elements |
0.79764 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.01306 |
| scoring_system |
epss |
| scoring_elements |
0.7977 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.01306 |
| scoring_system |
epss |
| scoring_elements |
0.79792 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.01306 |
| scoring_system |
epss |
| scoring_elements |
0.79776 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3620 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3620
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ekav-zg3k-v3ea |
|
| 81 |
| url |
VCID-etzn-uhck-h7b2 |
| vulnerability_id |
VCID-etzn-uhck-h7b2 |
| summary |
curl: curl: Information disclosure via OAuth2 bearer token leakage during HTTP(S) redirect |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3783 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.035 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03509 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03544 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03521 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0352 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03496 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04144 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.042 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04175 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3783 |
|
| 2 |
| reference_url |
https://curl.se/docs/CVE-2026-3783.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
Medium |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:25:28Z/ |
|
|
| url |
https://curl.se/docs/CVE-2026-3783.html |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-3783
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-etzn-uhck-h7b2 |
|
| 82 |
| url |
VCID-exhe-cmqf-duad |
| vulnerability_id |
VCID-exhe-cmqf-duad |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which might allow remote execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-2192 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02049 |
| scoring_system |
epss |
| scoring_elements |
0.83894 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.02049 |
| scoring_system |
epss |
| scoring_elements |
0.83795 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02049 |
| scoring_system |
epss |
| scoring_elements |
0.83808 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02049 |
| scoring_system |
epss |
| scoring_elements |
0.83823 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02049 |
| scoring_system |
epss |
| scoring_elements |
0.83825 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02049 |
| scoring_system |
epss |
| scoring_elements |
0.83849 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02049 |
| scoring_system |
epss |
| scoring_elements |
0.83855 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02049 |
| scoring_system |
epss |
| scoring_elements |
0.83872 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02049 |
| scoring_system |
epss |
| scoring_elements |
0.83866 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02049 |
| scoring_system |
epss |
| scoring_elements |
0.83861 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-2192 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-2192
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-exhe-cmqf-duad |
|
| 83 |
| url |
VCID-f1aq-3cj8-gfbq |
| vulnerability_id |
VCID-f1aq-3cj8-gfbq |
| summary |
curl 7.x before 7.10.7 sends CONNECT proxy credentials to the remote server. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2003-1605 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59453 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59421 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59308 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59382 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59406 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59372 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59423 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59437 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59455 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59439 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2003-1605 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2003-1605
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-f1aq-3cj8-gfbq |
|
| 84 |
| url |
VCID-fnj3-2du1-4bhx |
| vulnerability_id |
VCID-fnj3-2du1-4bhx |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-9586 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00891 |
| scoring_system |
epss |
| scoring_elements |
0.75492 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00891 |
| scoring_system |
epss |
| scoring_elements |
0.7559 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00891 |
| scoring_system |
epss |
| scoring_elements |
0.75494 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00891 |
| scoring_system |
epss |
| scoring_elements |
0.75525 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00891 |
| scoring_system |
epss |
| scoring_elements |
0.75506 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00891 |
| scoring_system |
epss |
| scoring_elements |
0.75548 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00891 |
| scoring_system |
epss |
| scoring_elements |
0.75557 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00891 |
| scoring_system |
epss |
| scoring_elements |
0.75578 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-9586 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-9586
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fnj3-2du1-4bhx |
|
| 85 |
| url |
VCID-fnr7-xb26-dbez |
| vulnerability_id |
VCID-fnr7-xb26-dbez |
| summary |
Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via a large value as the retry delay. NOTE: many parties report that this has no direct security impact on the curl user; however, it may (in theory) cause a denial of service to associated systems or networks if, for example, --retry-delay is misinterpreted as a value much smaller than what was intended. This is not especially plausible because the overflow only happens if the user was trying to specify that curl should wait weeks (or longer) before trying to recover from a transient error. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-19909 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04279 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04329 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04307 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04228 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04269 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0429 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04302 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04334 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04349 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04343 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-19909 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-19909
|
| risk_score |
0.8 |
| exploitability |
0.5 |
| weighted_severity |
1.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fnr7-xb26-dbez |
|
| 86 |
| url |
VCID-fp65-97n1-xuaj |
| vulnerability_id |
VCID-fp65-97n1-xuaj |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which may allow attackers to bypass intended restrictions. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000100 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00962 |
| scoring_system |
epss |
| scoring_elements |
0.76442 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00962 |
| scoring_system |
epss |
| scoring_elements |
0.7654 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00962 |
| scoring_system |
epss |
| scoring_elements |
0.76447 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00962 |
| scoring_system |
epss |
| scoring_elements |
0.76475 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00962 |
| scoring_system |
epss |
| scoring_elements |
0.76457 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00962 |
| scoring_system |
epss |
| scoring_elements |
0.76489 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00962 |
| scoring_system |
epss |
| scoring_elements |
0.76501 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00962 |
| scoring_system |
epss |
| scoring_elements |
0.76527 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00962 |
| scoring_system |
epss |
| scoring_elements |
0.76506 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00962 |
| scoring_system |
epss |
| scoring_elements |
0.765 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000100 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-1000100
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fp65-97n1-xuaj |
|
| 87 |
| url |
VCID-frgg-29yv-dyf7 |
| vulnerability_id |
VCID-frgg-29yv-dyf7 |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could result in the arbitrary execution of code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22890 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25887 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.258 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25952 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25993 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25764 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25834 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25885 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25897 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25854 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25797 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22890 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22890
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-frgg-29yv-dyf7 |
|
| 88 |
| url |
VCID-ggt7-eejg-xfb6 |
| vulnerability_id |
VCID-ggt7-eejg-xfb6 |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could result in the arbitrary execution of code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22876 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20928 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20845 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20987 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.20925 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.21131 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.21078 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00068 |
| scoring_system |
epss |
| scoring_elements |
0.21003 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30169 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30153 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30201 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22876 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22876
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ggt7-eejg-xfb6 |
|
| 89 |
| url |
VCID-gnx2-djyk-uyaf |
| vulnerability_id |
VCID-gnx2-djyk-uyaf |
| summary |
Cookie injection with none file
This flaw allows an attacker to insert cookies at will into a running program
using libcurl, if the specific series of conditions are met.
libcurl performs transfers. In its API, an application creates "easy handles"
that are the individual handles for single transfers.
libcurl provides a function call that duplicates en easy handle called
[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).
If a transfer has cookies enabled when the handle is duplicated, the
cookie-enable state is also cloned - but without cloning the actual
cookies. If the source handle does not read any cookies from a specific file on
disk, the cloned version of the handle would instead store the file name as
`none` (using the four ASCII letters, no quotes).
Subsequent use of the cloned handle that does not explicitly set a source to
load cookies from would then inadvertently load cookies from a file named
`none` - if such a file exists and is readable in the current directory of the
program using libcurl. And if using the correct file format of course. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-38546 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.49036 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.48964 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.48991 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.48944 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.48998 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.48995 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.49012 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00256 |
| scoring_system |
epss |
| scoring_elements |
0.48985 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-38546 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-38546
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gnx2-djyk-uyaf |
|
| 90 |
| url |
VCID-gv7x-j8bz-wycc |
| vulnerability_id |
VCID-gv7x-j8bz-wycc |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-32207 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42654 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42604 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42633 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42572 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42624 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42635 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42658 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42622 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00204 |
| scoring_system |
epss |
| scoring_elements |
0.42594 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-32207 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-32207
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gv7x-j8bz-wycc |
|
| 91 |
| url |
VCID-gwb6-rf4r-d3b2 |
| vulnerability_id |
VCID-gwb6-rf4r-d3b2 |
| summary |
Multiple vulnerabilities have been found in cURL, allowing
attackers to execute arbitrary code or cause Denial of Service. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0249 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.44202 |
| scoring_system |
epss |
| scoring_elements |
0.97557 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.44202 |
| scoring_system |
epss |
| scoring_elements |
0.97549 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.44202 |
| scoring_system |
epss |
| scoring_elements |
0.97526 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.44202 |
| scoring_system |
epss |
| scoring_elements |
0.97531 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.44202 |
| scoring_system |
epss |
| scoring_elements |
0.97534 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.44202 |
| scoring_system |
epss |
| scoring_elements |
0.97536 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.44202 |
| scoring_system |
epss |
| scoring_elements |
0.97541 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.44202 |
| scoring_system |
epss |
| scoring_elements |
0.97543 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.44202 |
| scoring_system |
epss |
| scoring_elements |
0.97546 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-0249 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-0249
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gwb6-rf4r-d3b2 |
|
| 92 |
| url |
VCID-hj8v-tgnn-mfdw |
| vulnerability_id |
VCID-hj8v-tgnn-mfdw |
| summary |
The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, allows remote attackers to obtain sensitive information, cause a denial of service (crash), or possibly have unspecified other impact via a wildcard certificate name, which triggers an out-of-bounds read. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-9953 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01854 |
| scoring_system |
epss |
| scoring_elements |
0.83049 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.01854 |
| scoring_system |
epss |
| scoring_elements |
0.82946 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01854 |
| scoring_system |
epss |
| scoring_elements |
0.82963 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01854 |
| scoring_system |
epss |
| scoring_elements |
0.82976 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01854 |
| scoring_system |
epss |
| scoring_elements |
0.82973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01854 |
| scoring_system |
epss |
| scoring_elements |
0.82998 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01854 |
| scoring_system |
epss |
| scoring_elements |
0.83005 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01854 |
| scoring_system |
epss |
| scoring_elements |
0.83021 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01854 |
| scoring_system |
epss |
| scoring_elements |
0.83015 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01854 |
| scoring_system |
epss |
| scoring_elements |
0.8301 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-9953 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-9953
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hj8v-tgnn-mfdw |
|
| 93 |
| url |
VCID-hjkx-6yep-mkde |
| vulnerability_id |
VCID-hjkx-6yep-mkde |
| summary |
curl: removes wrong file on error |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27778 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75856 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75844 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75825 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75818 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75764 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75796 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75776 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75808 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.7582 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27778 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-27778
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hjkx-6yep-mkde |
|
| 94 |
| url |
VCID-hrsy-694u-2fec |
| vulnerability_id |
VCID-hrsy-694u-2fec |
| summary |
curl: OCSP stapling bypass with GnuTLS |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-8096 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66629 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66562 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66587 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66559 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66606 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.6662 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66638 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66626 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66593 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-8096 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://curl.se/docs/CVE-2024-8096.html |
| reference_id |
CVE-2024-8096.html |
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
|
| 1 |
| value |
Medium |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T13:42:47Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-8096.html |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-8096
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hrsy-694u-2fec |
|
| 95 |
| url |
VCID-hudt-78dw-tkf2 |
| vulnerability_id |
VCID-hudt-78dw-tkf2 |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22925 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.5489 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.55017 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.55005 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.55006 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54956 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.5496 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54986 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62217 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62194 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62173 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22925 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22925
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hudt-78dw-tkf2 |
|
| 96 |
| url |
VCID-hyqp-z8hb-fqbt |
| vulnerability_id |
VCID-hyqp-z8hb-fqbt |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-9594 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77857 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77954 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77864 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77892 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77874 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77901 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77906 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77933 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77917 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77916 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-9594 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-9594
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hyqp-z8hb-fqbt |
|
| 97 |
| url |
VCID-j2cq-q3r9-jfcp |
| vulnerability_id |
VCID-j2cq-q3r9-jfcp |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8620 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00816 |
| scoring_system |
epss |
| scoring_elements |
0.74253 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00816 |
| scoring_system |
epss |
| scoring_elements |
0.74335 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00816 |
| scoring_system |
epss |
| scoring_elements |
0.74326 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00816 |
| scoring_system |
epss |
| scoring_elements |
0.74306 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00816 |
| scoring_system |
epss |
| scoring_elements |
0.74298 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00816 |
| scoring_system |
epss |
| scoring_elements |
0.74258 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00816 |
| scoring_system |
epss |
| scoring_elements |
0.74284 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00816 |
| scoring_system |
epss |
| scoring_elements |
0.7429 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00816 |
| scoring_system |
epss |
| scoring_elements |
0.74305 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8620 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-8620
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j2cq-q3r9-jfcp |
|
| 98 |
| url |
VCID-j2qx-np45-4qdu |
| vulnerability_id |
VCID-j2qx-np45-4qdu |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which may allow execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000257 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00875 |
| scoring_system |
epss |
| scoring_elements |
0.75327 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.01001 |
| scoring_system |
epss |
| scoring_elements |
0.76996 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.01001 |
| scoring_system |
epss |
| scoring_elements |
0.77017 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.01001 |
| scoring_system |
epss |
| scoring_elements |
0.76991 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.0109 |
| scoring_system |
epss |
| scoring_elements |
0.77876 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80553 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80545 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80531 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80584 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80574 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000257 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-1000257
|
| risk_score |
4.1 |
| exploitability |
0.5 |
| weighted_severity |
8.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j2qx-np45-4qdu |
|
| 99 |
| url |
VCID-j5s3-rr74-nqb8 |
| vulnerability_id |
VCID-j5s3-rr74-nqb8 |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could result in information disclosure or data loss. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8169 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15732 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15576 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15743 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15708 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15643 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.1576 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15827 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.1563 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15715 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15774 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8169 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8169
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j5s3-rr74-nqb8 |
|
| 100 |
| url |
VCID-jeqg-g3en-5udw |
| vulnerability_id |
VCID-jeqg-g3en-5udw |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5420 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01086 |
| scoring_system |
epss |
| scoring_elements |
0.77847 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01086 |
| scoring_system |
epss |
| scoring_elements |
0.77944 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.01086 |
| scoring_system |
epss |
| scoring_elements |
0.77907 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.01086 |
| scoring_system |
epss |
| scoring_elements |
0.77906 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.01086 |
| scoring_system |
epss |
| scoring_elements |
0.77854 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.01086 |
| scoring_system |
epss |
| scoring_elements |
0.77882 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.01086 |
| scoring_system |
epss |
| scoring_elements |
0.77864 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.01086 |
| scoring_system |
epss |
| scoring_elements |
0.77891 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.01086 |
| scoring_system |
epss |
| scoring_elements |
0.77896 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.01086 |
| scoring_system |
epss |
| scoring_elements |
0.77923 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5420 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-5420
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jeqg-g3en-5udw |
|
| 101 |
| url |
VCID-jnfc-8f5d-pyh4 |
| vulnerability_id |
VCID-jnfc-8f5d-pyh4 |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could result in a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000005 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00326 |
| scoring_system |
epss |
| scoring_elements |
0.55445 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00326 |
| scoring_system |
epss |
| scoring_elements |
0.55582 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00326 |
| scoring_system |
epss |
| scoring_elements |
0.55555 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00326 |
| scoring_system |
epss |
| scoring_elements |
0.5558 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00326 |
| scoring_system |
epss |
| scoring_elements |
0.55558 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00326 |
| scoring_system |
epss |
| scoring_elements |
0.55609 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00326 |
| scoring_system |
epss |
| scoring_elements |
0.55611 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00326 |
| scoring_system |
epss |
| scoring_elements |
0.5562 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00326 |
| scoring_system |
epss |
| scoring_elements |
0.55599 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000005 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-1000005
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jnfc-8f5d-pyh4 |
|
| 102 |
| url |
VCID-jqqf-gmd3-ubcd |
| vulnerability_id |
VCID-jqqf-gmd3-ubcd |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8621 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0226 |
| scoring_system |
epss |
| scoring_elements |
0.84539 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0226 |
| scoring_system |
epss |
| scoring_elements |
0.84638 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.0226 |
| scoring_system |
epss |
| scoring_elements |
0.84555 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0226 |
| scoring_system |
epss |
| scoring_elements |
0.84576 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0226 |
| scoring_system |
epss |
| scoring_elements |
0.8458 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0226 |
| scoring_system |
epss |
| scoring_elements |
0.84601 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0226 |
| scoring_system |
epss |
| scoring_elements |
0.84608 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0226 |
| scoring_system |
epss |
| scoring_elements |
0.84627 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0226 |
| scoring_system |
epss |
| scoring_elements |
0.84622 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0226 |
| scoring_system |
epss |
| scoring_elements |
0.84617 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8621 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-8621
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jqqf-gmd3-ubcd |
|
| 103 |
| url |
VCID-jtw4-af4y-nkbk |
| vulnerability_id |
VCID-jtw4-af4y-nkbk |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8619 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02935 |
| scoring_system |
epss |
| scoring_elements |
0.86359 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02935 |
| scoring_system |
epss |
| scoring_elements |
0.86441 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.02935 |
| scoring_system |
epss |
| scoring_elements |
0.8637 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02935 |
| scoring_system |
epss |
| scoring_elements |
0.86387 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02935 |
| scoring_system |
epss |
| scoring_elements |
0.86389 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02935 |
| scoring_system |
epss |
| scoring_elements |
0.86408 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02935 |
| scoring_system |
epss |
| scoring_elements |
0.86418 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02935 |
| scoring_system |
epss |
| scoring_elements |
0.86432 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02935 |
| scoring_system |
epss |
| scoring_elements |
0.8643 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02935 |
| scoring_system |
epss |
| scoring_elements |
0.86425 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8619 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-8619
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jtw4-af4y-nkbk |
|
| 104 |
| url |
VCID-ju6h-a1sz-f7e5 |
| vulnerability_id |
VCID-ju6h-a1sz-f7e5 |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could result in information disclosure or data loss. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8285 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00742 |
| scoring_system |
epss |
| scoring_elements |
0.7291 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00742 |
| scoring_system |
epss |
| scoring_elements |
0.73008 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00742 |
| scoring_system |
epss |
| scoring_elements |
0.72994 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00742 |
| scoring_system |
epss |
| scoring_elements |
0.72973 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00742 |
| scoring_system |
epss |
| scoring_elements |
0.72967 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00742 |
| scoring_system |
epss |
| scoring_elements |
0.72922 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00742 |
| scoring_system |
epss |
| scoring_elements |
0.72942 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00742 |
| scoring_system |
epss |
| scoring_elements |
0.72917 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00742 |
| scoring_system |
epss |
| scoring_elements |
0.72955 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00742 |
| scoring_system |
epss |
| scoring_elements |
0.72968 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8285 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8285
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ju6h-a1sz-f7e5 |
|
| 105 |
| url |
VCID-k8kj-q1je-f7bt |
| vulnerability_id |
VCID-k8kj-q1je-f7bt |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7167 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02289 |
| scoring_system |
epss |
| scoring_elements |
0.84631 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02289 |
| scoring_system |
epss |
| scoring_elements |
0.84726 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.02289 |
| scoring_system |
epss |
| scoring_elements |
0.84696 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.02289 |
| scoring_system |
epss |
| scoring_elements |
0.84715 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.02289 |
| scoring_system |
epss |
| scoring_elements |
0.8471 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.02289 |
| scoring_system |
epss |
| scoring_elements |
0.84704 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.02289 |
| scoring_system |
epss |
| scoring_elements |
0.84646 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.02289 |
| scoring_system |
epss |
| scoring_elements |
0.84666 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.02289 |
| scoring_system |
epss |
| scoring_elements |
0.84667 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.02289 |
| scoring_system |
epss |
| scoring_elements |
0.84689 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-7167 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-7167
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k8kj-q1je-f7bt |
|
| 106 |
| url |
VCID-ke81-x2ze-rbc5 |
| vulnerability_id |
VCID-ke81-x2ze-rbc5 |
| summary |
Double Free
A double free vulnerability exists in libcurl <8.0.0 when sharing HSTS data between separate "handles". This sharing was introduced without considerations for do this sharing across separate threads but there was no indication of this fact in the documentation. Due to missing mutexes or thread locks, two threads sharing the same HSTS data could end up doing a double-free or use-after-free. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-27537 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14504 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14539 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14609 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14418 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14558 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14506 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.1908 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24288 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24345 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-27537 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-27537
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ke81-x2ze-rbc5 |
|
| 107 |
| url |
VCID-krgt-drpz-y7cy |
| vulnerability_id |
VCID-krgt-drpz-y7cy |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could result in a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000300 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0089 |
| scoring_system |
epss |
| scoring_elements |
0.75468 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0089 |
| scoring_system |
epss |
| scoring_elements |
0.75565 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.0089 |
| scoring_system |
epss |
| scoring_elements |
0.7547 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0089 |
| scoring_system |
epss |
| scoring_elements |
0.75501 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0089 |
| scoring_system |
epss |
| scoring_elements |
0.75482 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0089 |
| scoring_system |
epss |
| scoring_elements |
0.75524 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0089 |
| scoring_system |
epss |
| scoring_elements |
0.75533 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0089 |
| scoring_system |
epss |
| scoring_elements |
0.75553 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0089 |
| scoring_system |
epss |
| scoring_elements |
0.75531 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0089 |
| scoring_system |
epss |
| scoring_elements |
0.75522 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1000300 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-1000300
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-krgt-drpz-y7cy |
|
| 108 |
| url |
VCID-ksap-zrmb-ebcu |
| vulnerability_id |
VCID-ksap-zrmb-ebcu |
| summary |
curl: predictable WebSocket mask |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-10148 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28205 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28161 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30683 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30714 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30746 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30749 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30704 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30659 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-10148 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-10148
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ksap-zrmb-ebcu |
|
| 109 |
| url |
VCID-kt4b-7ffh-4bch |
| vulnerability_id |
VCID-kt4b-7ffh-4bch |
| summary |
When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey`
with the curl tool,curl should check the public key of the server certificate
to verify the peer.
This check was skipped in a certain condition that would then make curl allow
the connection without performing the proper check, thus not noticing a
possible impostor. To skip this check, the connection had to be done with QUIC
with ngtcp2 built to use GnuTLS and the user had to explicitly disable the
standard certificate verification. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-13034 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01204 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.012 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0122 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01226 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0123 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01213 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01207 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01209 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01211 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-13034 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-13034
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kt4b-7ffh-4bch |
|
| 110 |
| url |
VCID-m15r-v9sr-2bbn |
| vulnerability_id |
VCID-m15r-v9sr-2bbn |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28319 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55114 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55072 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55097 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55073 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55122 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55134 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28319 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-28319
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m15r-v9sr-2bbn |
|
| 111 |
| url |
VCID-m3nh-aha9-dfbc |
| vulnerability_id |
VCID-m3nh-aha9-dfbc |
| summary |
Absolute path traversal vulnerability in curl 7.20.0 through 7.21.1, when the --remote-header-name or -J option is used, allows remote servers to create or overwrite arbitrary files by using \ (backslash) as a separator of path components within the Content-disposition HTTP header. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-3842 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00898 |
| scoring_system |
epss |
| scoring_elements |
0.75686 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00898 |
| scoring_system |
epss |
| scoring_elements |
0.75655 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00898 |
| scoring_system |
epss |
| scoring_elements |
0.7559 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00898 |
| scoring_system |
epss |
| scoring_elements |
0.75592 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00898 |
| scoring_system |
epss |
| scoring_elements |
0.75623 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00898 |
| scoring_system |
epss |
| scoring_elements |
0.75603 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00898 |
| scoring_system |
epss |
| scoring_elements |
0.75638 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00898 |
| scoring_system |
epss |
| scoring_elements |
0.75649 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00898 |
| scoring_system |
epss |
| scoring_elements |
0.75673 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-3842 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-3842
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m3nh-aha9-dfbc |
|
| 112 |
| url |
VCID-m3r3-25yq-hqdc |
| vulnerability_id |
VCID-m3r3-25yq-hqdc |
| summary |
Curl before 7.49.1 in Apple OS X before macOS Sierra prior to 10.12 allows remote or local attackers to execute arbitrary code, gain sensitive information, cause denial-of-service conditions, bypass security restrictions, and perform unauthorized actions. This may aid in other attacks. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4606 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44368 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44439 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.4446 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44395 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44446 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44453 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.4447 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44438 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44437 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44494 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4606 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-4606
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m3r3-25yq-hqdc |
|
| 113 |
| url |
VCID-m5fs-um7r-9qh2 |
| vulnerability_id |
VCID-m5fs-um7r-9qh2 |
| summary |
curl: libcurl: WebSocket endless loop |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-5399 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0021 |
| scoring_system |
epss |
| scoring_elements |
0.43448 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65404 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65362 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65326 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65378 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65389 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65409 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65396 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65368 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-5399 |
|
| 2 |
| reference_url |
https://curl.se/docs/CVE-2025-5399.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T13:20:18Z/ |
|
|
| url |
https://curl.se/docs/CVE-2025-5399.html |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-5399
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m5fs-um7r-9qh2 |
|
| 114 |
| url |
VCID-ma8s-he6x-z7a8 |
| vulnerability_id |
VCID-ma8s-he6x-z7a8 |
| summary |
curl and libcurl 7.27.0 through 7.35.0, when running on Windows and using the SChannel/Winssl TLS backend, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP address, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-2522 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52599 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52452 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52498 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52525 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52491 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52544 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52539 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.5259 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52574 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52559 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-2522 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-2522
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ma8s-he6x-z7a8 |
|
| 115 |
| url |
VCID-mkyr-w79c-qqfz |
| vulnerability_id |
VCID-mkyr-w79c-qqfz |
| summary |
curl: curl: Security bypass due to global TLS option changes in multi-threaded LDAPS transfers |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-14017 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00579 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00593 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00595 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00587 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00586 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00582 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.00583 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
7e-05 |
| scoring_system |
epss |
| scoring_elements |
0.006 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-14017 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-14017
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mkyr-w79c-qqfz |
|
| 116 |
| url |
VCID-ms2r-94ph-yyh3 |
| vulnerability_id |
VCID-ms2r-94ph-yyh3 |
| summary |
Improper Authentication
An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-27536 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01282 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01285 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0129 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01301 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01306 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0131 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01294 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01288 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01291 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-27536 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-27536
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ms2r-94ph-yyh3 |
|
| 117 |
| url |
VCID-my7a-jeng-5bhw |
| vulnerability_id |
VCID-my7a-jeng-5bhw |
| summary |
curl: macidn punycode buffer overread |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-6874 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0099 |
| scoring_system |
epss |
| scoring_elements |
0.7692 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.0099 |
| scoring_system |
epss |
| scoring_elements |
0.76826 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0099 |
| scoring_system |
epss |
| scoring_elements |
0.76855 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0099 |
| scoring_system |
epss |
| scoring_elements |
0.76835 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0099 |
| scoring_system |
epss |
| scoring_elements |
0.76866 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0099 |
| scoring_system |
epss |
| scoring_elements |
0.76877 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0099 |
| scoring_system |
epss |
| scoring_elements |
0.76905 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0099 |
| scoring_system |
epss |
| scoring_elements |
0.76884 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0099 |
| scoring_system |
epss |
| scoring_elements |
0.76879 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-6874 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://curl.se/docs/CVE-2024-6874.html |
| reference_id |
CVE-2024-6874.html |
| reference_type |
|
| scores |
| 0 |
| value |
3.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T16:13:40Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-6874.html |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-6874
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-my7a-jeng-5bhw |
|
| 118 |
| url |
VCID-n51k-39uk-auca |
| vulnerability_id |
VCID-n51k-39uk-auca |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could result in information disclosure or data loss. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8286 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52154 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52128 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00286 |
| scoring_system |
epss |
| scoring_elements |
0.52113 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59717 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59638 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59662 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59564 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59632 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59683 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00384 |
| scoring_system |
epss |
| scoring_elements |
0.59697 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8286 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8286
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n51k-39uk-auca |
|
| 119 |
| url |
VCID-n57n-cymy-z7dr |
| vulnerability_id |
VCID-n57n-cymy-z7dr |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-23916 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25909 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.2607 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.2611 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25878 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25948 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25999 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.26009 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25964 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25905 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-23916 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-23916
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n57n-cymy-z7dr |
|
| 120 |
| url |
VCID-nvzd-v3bs-6qek |
| vulnerability_id |
VCID-nvzd-v3bs-6qek |
| summary |
When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-15079 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10292 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10237 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10359 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.1026 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10333 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10399 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10428 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10388 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10366 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-15079 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-15079
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nvzd-v3bs-6qek |
|
| 121 |
| url |
VCID-ph5u-5j8n-4qah |
| vulnerability_id |
VCID-ph5u-5j8n-4qah |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could result in the arbitrary execution of code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22898 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31806 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.3184 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31935 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31977 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31797 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31849 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31879 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31882 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31843 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31808 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22898 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22898
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ph5u-5j8n-4qah |
|
| 122 |
| url |
VCID-prff-34kh-kbat |
| vulnerability_id |
VCID-prff-34kh-kbat |
| summary |
Multiple vulnerabilities have been found in cURL, allowing
attackers to execute arbitrary code or cause Denial of Service. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1944 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02482 |
| scoring_system |
epss |
| scoring_elements |
0.85315 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.02482 |
| scoring_system |
epss |
| scoring_elements |
0.85295 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.02482 |
| scoring_system |
epss |
| scoring_elements |
0.85223 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.02482 |
| scoring_system |
epss |
| scoring_elements |
0.85234 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.02482 |
| scoring_system |
epss |
| scoring_elements |
0.85253 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.02482 |
| scoring_system |
epss |
| scoring_elements |
0.85255 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.02482 |
| scoring_system |
epss |
| scoring_elements |
0.85277 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.02482 |
| scoring_system |
epss |
| scoring_elements |
0.85285 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.02482 |
| scoring_system |
epss |
| scoring_elements |
0.853 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.02482 |
| scoring_system |
epss |
| scoring_elements |
0.85298 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1944 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
|
| 105 |
|
| 106 |
|
| 107 |
|
| 108 |
|
| 109 |
|
| 110 |
|
| 111 |
|
| 112 |
|
| 113 |
|
| 114 |
|
| 115 |
|
| 116 |
|
| 117 |
|
| 118 |
|
| 119 |
|
| 120 |
|
| 121 |
|
| 122 |
|
| 123 |
|
| 124 |
|
| 125 |
|
| 126 |
|
| 127 |
|
| 128 |
|
| 129 |
|
| 130 |
|
| 131 |
|
| 132 |
|
| 133 |
|
| 134 |
|
| 135 |
|
| 136 |
|
| 137 |
|
| 138 |
|
| 139 |
|
| 140 |
|
| 141 |
|
| 142 |
|
| 143 |
|
| 144 |
|
| 145 |
|
| 146 |
|
| 147 |
|
| 148 |
|
| 149 |
|
| 150 |
|
| 151 |
|
| 152 |
|
| 153 |
|
| 154 |
|
| 155 |
|
| 156 |
|
| 157 |
|
| 158 |
|
| 159 |
|
| 160 |
|
| 161 |
|
| 162 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-1944
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-prff-34kh-kbat |
|
| 123 |
| url |
VCID-pwn6-j8vf-rufk |
| vulnerability_id |
VCID-pwn6-j8vf-rufk |
| summary |
curl: HSTS subdomain overwrites parent cache entry |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-9681 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72605 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72522 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72539 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72515 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72554 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72566 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.7259 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72572 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00725 |
| scoring_system |
epss |
| scoring_elements |
0.72562 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-9681 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://curl.se/docs/CVE-2024-9681.html |
| reference_id |
CVE-2024-9681.html |
| reference_type |
|
| scores |
| 0 |
| value |
5.9 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:16:59Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-9681.html |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-9681
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pwn6-j8vf-rufk |
|
| 124 |
| url |
VCID-q229-ag6u-u3hv |
| vulnerability_id |
VCID-q229-ag6u-u3hv |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-22576 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50585 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00272 |
| scoring_system |
epss |
| scoring_elements |
0.50613 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00339 |
| scoring_system |
epss |
| scoring_elements |
0.56699 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00339 |
| scoring_system |
epss |
| scoring_elements |
0.5669 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00339 |
| scoring_system |
epss |
| scoring_elements |
0.56669 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00357 |
| scoring_system |
epss |
| scoring_elements |
0.57955 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00357 |
| scoring_system |
epss |
| scoring_elements |
0.5801 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00357 |
| scoring_system |
epss |
| scoring_elements |
0.58012 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00357 |
| scoring_system |
epss |
| scoring_elements |
0.58028 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-22576 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-22576
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q229-ag6u-u3hv |
|
| 125 |
| url |
VCID-q3hu-8uy5-e3a4 |
| vulnerability_id |
VCID-q3hu-8uy5-e3a4 |
| summary |
A coding error has been found in cURL, causing the TLS Certificate
Status Request extension check to always return true. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2629 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00363 |
| scoring_system |
epss |
| scoring_elements |
0.58261 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00363 |
| scoring_system |
epss |
| scoring_elements |
0.58408 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00363 |
| scoring_system |
epss |
| scoring_elements |
0.58346 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00363 |
| scoring_system |
epss |
| scoring_elements |
0.58366 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00363 |
| scoring_system |
epss |
| scoring_elements |
0.5834 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00363 |
| scoring_system |
epss |
| scoring_elements |
0.58393 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00363 |
| scoring_system |
epss |
| scoring_elements |
0.58399 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00363 |
| scoring_system |
epss |
| scoring_elements |
0.58416 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00363 |
| scoring_system |
epss |
| scoring_elements |
0.58395 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00363 |
| scoring_system |
epss |
| scoring_elements |
0.58376 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2629 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2629
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q3hu-8uy5-e3a4 |
|
| 126 |
| url |
VCID-qbpd-star-6fgn |
| vulnerability_id |
VCID-qbpd-star-6fgn |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22923 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25873 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25784 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25937 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25978 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25745 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25816 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25868 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25879 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25838 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00092 |
| scoring_system |
epss |
| scoring_elements |
0.25782 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22923 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22923
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qbpd-star-6fgn |
|
| 127 |
| url |
VCID-qdcn-2u3v-b3cv |
| vulnerability_id |
VCID-qdcn-2u3v-b3cv |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46218 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60632 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60627 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60612 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00398 |
| scoring_system |
epss |
| scoring_elements |
0.60591 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.62608 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.62656 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.62672 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.62606 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.62641 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-46218 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-46218
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qdcn-2u3v-b3cv |
|
| 128 |
| url |
VCID-qka4-jfdb-w3d5 |
| vulnerability_id |
VCID-qka4-jfdb-w3d5 |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which can allow remote attackers to cause Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3144 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.7711 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77008 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77013 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77043 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77023 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77055 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77066 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77094 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77074 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01008 |
| scoring_system |
epss |
| scoring_elements |
0.77069 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3144 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3144
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qka4-jfdb-w3d5 |
|
| 129 |
| url |
VCID-qpfa-s6sd-8yct |
| vulnerability_id |
VCID-qpfa-s6sd-8yct |
| summary |
curl: Windows OpenSSL engine code injection |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-5443 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76346 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.7635 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76379 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76359 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76392 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76405 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76431 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76409 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76404 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76444 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-5443 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-5443
|
| risk_score |
3.8 |
| exploitability |
0.5 |
| weighted_severity |
7.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qpfa-s6sd-8yct |
|
| 130 |
| url |
VCID-qpux-jh6k-8qhx |
| vulnerability_id |
VCID-qpux-jh6k-8qhx |
| summary |
curl: Curl missing SFTP host verification with wolfSSH backend |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-10966 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04624 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05191 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05467 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05252 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05288 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05309 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05274 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.0526 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05246 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-10966 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-10966
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qpux-jh6k-8qhx |
|
| 131 |
| url |
VCID-r3ny-7kn7-ukaa |
| vulnerability_id |
VCID-r3ny-7kn7-ukaa |
| summary |
An error in the X.509 certificate handling of cURL might enable remote
attackers to conduct man-in-the-middle attacks. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2417 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0733 |
| scoring_system |
epss |
| scoring_elements |
0.91717 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.0733 |
| scoring_system |
epss |
| scoring_elements |
0.91653 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0733 |
| scoring_system |
epss |
| scoring_elements |
0.91661 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0733 |
| scoring_system |
epss |
| scoring_elements |
0.91666 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0733 |
| scoring_system |
epss |
| scoring_elements |
0.91675 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0733 |
| scoring_system |
epss |
| scoring_elements |
0.91688 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0733 |
| scoring_system |
epss |
| scoring_elements |
0.91694 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0733 |
| scoring_system |
epss |
| scoring_elements |
0.91697 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0733 |
| scoring_system |
epss |
| scoring_elements |
0.917 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0733 |
| scoring_system |
epss |
| scoring_elements |
0.91696 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2009-2417 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2009-2417
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r3ny-7kn7-ukaa |
|
| 132 |
| url |
VCID-r447-deb8-2ydj |
| vulnerability_id |
VCID-r447-deb8-2ydj |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which can allow remote attackers to cause Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3237 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05127 |
| scoring_system |
epss |
| scoring_elements |
0.89873 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.05127 |
| scoring_system |
epss |
| scoring_elements |
0.89818 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.05127 |
| scoring_system |
epss |
| scoring_elements |
0.89821 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.05127 |
| scoring_system |
epss |
| scoring_elements |
0.89835 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.05127 |
| scoring_system |
epss |
| scoring_elements |
0.89839 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.05127 |
| scoring_system |
epss |
| scoring_elements |
0.89857 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.05127 |
| scoring_system |
epss |
| scoring_elements |
0.89863 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.05127 |
| scoring_system |
epss |
| scoring_elements |
0.89869 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.05127 |
| scoring_system |
epss |
| scoring_elements |
0.89867 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.05127 |
| scoring_system |
epss |
| scoring_elements |
0.8986 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3237 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3237
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r447-deb8-2ydj |
|
| 133 |
| url |
VCID-r7bh-7wur-xffs |
| vulnerability_id |
VCID-r7bh-7wur-xffs |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27776 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00682 |
| scoring_system |
epss |
| scoring_elements |
0.71649 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00682 |
| scoring_system |
epss |
| scoring_elements |
0.71574 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00682 |
| scoring_system |
epss |
| scoring_elements |
0.71592 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00682 |
| scoring_system |
epss |
| scoring_elements |
0.71565 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00682 |
| scoring_system |
epss |
| scoring_elements |
0.71605 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00682 |
| scoring_system |
epss |
| scoring_elements |
0.71616 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00682 |
| scoring_system |
epss |
| scoring_elements |
0.71639 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00682 |
| scoring_system |
epss |
| scoring_elements |
0.71623 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00682 |
| scoring_system |
epss |
| scoring_elements |
0.71604 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27776 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-27776
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r7bh-7wur-xffs |
|
| 134 |
| url |
VCID-rg54-svzj-x7f9 |
| vulnerability_id |
VCID-rg54-svzj-x7f9 |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-35260 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.3993 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39957 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41282 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41341 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41333 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41362 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48694 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48632 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48645 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-35260 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-35260
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rg54-svzj-x7f9 |
|
| 135 |
| url |
VCID-rhxh-77pj-1bfy |
| vulnerability_id |
VCID-rhxh-77pj-1bfy |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27780 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36677 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36748 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36779 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36615 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36667 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36683 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36692 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36658 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36632 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27780 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-27780
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rhxh-77pj-1bfy |
|
| 136 |
| url |
VCID-rmez-cwu2-2ya7 |
| vulnerability_id |
VCID-rmez-cwu2-2ya7 |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could result in information disclosure or data loss. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8284 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28391 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28321 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28411 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28368 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.2831 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28466 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28508 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28299 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28364 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00104 |
| scoring_system |
epss |
| scoring_elements |
0.28408 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8284 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8284
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rmez-cwu2-2ya7 |
|
| 137 |
| url |
VCID-s73y-y7v7-43cm |
| vulnerability_id |
VCID-s73y-y7v7-43cm |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28322 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00631 |
| scoring_system |
epss |
| scoring_elements |
0.70331 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00631 |
| scoring_system |
epss |
| scoring_elements |
0.70238 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00631 |
| scoring_system |
epss |
| scoring_elements |
0.70255 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00631 |
| scoring_system |
epss |
| scoring_elements |
0.70232 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00631 |
| scoring_system |
epss |
| scoring_elements |
0.70278 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00631 |
| scoring_system |
epss |
| scoring_elements |
0.70294 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00631 |
| scoring_system |
epss |
| scoring_elements |
0.70317 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00631 |
| scoring_system |
epss |
| scoring_elements |
0.70302 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00631 |
| scoring_system |
epss |
| scoring_elements |
0.70289 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28322 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-28322
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s73y-y7v7-43cm |
|
| 138 |
| url |
VCID-sh5a-fmna-wffr |
| vulnerability_id |
VCID-sh5a-fmna-wffr |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22946 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23143 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.2322 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23322 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23365 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23154 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23227 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23277 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23299 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23261 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23204 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22946 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22946
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sh5a-fmna-wffr |
|
| 139 |
| url |
VCID-sknq-8mm1-6qfe |
| vulnerability_id |
VCID-sknq-8mm1-6qfe |
| summary |
security update |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3613 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0182 |
| scoring_system |
epss |
| scoring_elements |
0.82903 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.0182 |
| scoring_system |
epss |
| scoring_elements |
0.82864 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.0182 |
| scoring_system |
epss |
| scoring_elements |
0.82801 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.0182 |
| scoring_system |
epss |
| scoring_elements |
0.82817 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.0182 |
| scoring_system |
epss |
| scoring_elements |
0.8283 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.0182 |
| scoring_system |
epss |
| scoring_elements |
0.82826 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.0182 |
| scoring_system |
epss |
| scoring_elements |
0.82851 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.0182 |
| scoring_system |
epss |
| scoring_elements |
0.82858 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.0182 |
| scoring_system |
epss |
| scoring_elements |
0.82874 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.0182 |
| scoring_system |
epss |
| scoring_elements |
0.82868 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-3613 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-3613
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sknq-8mm1-6qfe |
|
| 140 |
| url |
VCID-snaz-pg1h-8kew |
| vulnerability_id |
VCID-snaz-pg1h-8kew |
| summary |
cURL before 7.47.0 on Windows allows attackers to write to arbitrary files in the current working directory on a different drive via a colon in a remote file name. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-0754 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00351 |
| scoring_system |
epss |
| scoring_elements |
0.57561 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00351 |
| scoring_system |
epss |
| scoring_elements |
0.57555 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00351 |
| scoring_system |
epss |
| scoring_elements |
0.57533 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00351 |
| scoring_system |
epss |
| scoring_elements |
0.57423 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00351 |
| scoring_system |
epss |
| scoring_elements |
0.57507 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00351 |
| scoring_system |
epss |
| scoring_elements |
0.57528 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00351 |
| scoring_system |
epss |
| scoring_elements |
0.57504 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00351 |
| scoring_system |
epss |
| scoring_elements |
0.57556 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00351 |
| scoring_system |
epss |
| scoring_elements |
0.5756 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00351 |
| scoring_system |
epss |
| scoring_elements |
0.57575 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-0754 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-0754
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-snaz-pg1h-8kew |
|
| 141 |
| url |
VCID-syz5-5y6f-s7er |
| vulnerability_id |
VCID-syz5-5y6f-s7er |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-27534 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19882 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19963 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19904 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20068 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20126 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19854 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19933 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19988 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20007 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-27534 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-27534
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-syz5-5y6f-s7er |
|
| 142 |
| url |
VCID-t1fk-cbsx-j3gh |
| vulnerability_id |
VCID-t1fk-cbsx-j3gh |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-32205 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02588 |
| scoring_system |
epss |
| scoring_elements |
0.85604 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.02588 |
| scoring_system |
epss |
| scoring_elements |
0.85522 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02588 |
| scoring_system |
epss |
| scoring_elements |
0.85539 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02588 |
| scoring_system |
epss |
| scoring_elements |
0.85544 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02588 |
| scoring_system |
epss |
| scoring_elements |
0.85564 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02588 |
| scoring_system |
epss |
| scoring_elements |
0.85575 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02588 |
| scoring_system |
epss |
| scoring_elements |
0.85589 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02588 |
| scoring_system |
epss |
| scoring_elements |
0.85586 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02588 |
| scoring_system |
epss |
| scoring_elements |
0.85581 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-32205 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-32205
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t1fk-cbsx-j3gh |
|
| 143 |
| url |
VCID-t4gn-9fw8-gkc3 |
| vulnerability_id |
VCID-t4gn-9fw8-gkc3 |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22947 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.486 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48718 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48641 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48662 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48614 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48668 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48665 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48683 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48657 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48669 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22947 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22947
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t4gn-9fw8-gkc3 |
|
| 144 |
| url |
VCID-t753-w1ha-kqaz |
| vulnerability_id |
VCID-t753-w1ha-kqaz |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-8151 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62234 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62074 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62134 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62166 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62184 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62202 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.6222 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.6221 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62189 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-8151 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-8151
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t753-w1ha-kqaz |
|
| 145 |
| url |
VCID-t8t6-9wa3-aub7 |
| vulnerability_id |
VCID-t8t6-9wa3-aub7 |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27775 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35947 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.3597 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35931 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35907 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.36026 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.36057 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.3589 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.3594 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00152 |
| scoring_system |
epss |
| scoring_elements |
0.35964 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27775 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-27775
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t8t6-9wa3-aub7 |
|
| 146 |
| url |
VCID-t9p4-2x7v-yfaq |
| vulnerability_id |
VCID-t9p4-2x7v-yfaq |
| summary |
|
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-0167 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00331 |
| scoring_system |
epss |
| scoring_elements |
0.56103 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00331 |
| scoring_system |
epss |
| scoring_elements |
0.56114 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00331 |
| scoring_system |
epss |
| scoring_elements |
0.56109 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00331 |
| scoring_system |
epss |
| scoring_elements |
0.56074 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00331 |
| scoring_system |
epss |
| scoring_elements |
0.56091 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56786 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56789 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.5681 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56838 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-0167 |
|
| 1 |
| reference_url |
https://curl.se/docs/CVE-2025-0167.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-05T15:52:41Z/ |
|
|
| url |
https://curl.se/docs/CVE-2025-0167.html |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-0167
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t9p4-2x7v-yfaq |
|
| 147 |
| url |
VCID-tcqe-7skm-b3fz |
| vulnerability_id |
VCID-tcqe-7skm-b3fz |
| summary |
Out-of-bounds Write
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy
handshake.
When curl is asked to pass along the host name to the SOCKS5 proxy to allow
that to resolve the address instead of it getting done by curl itself, the
maximum length that host name can be is 255 bytes.
If the host name is detected to be longer, curl switches to local name
resolving and instead passes on the resolved address only. Due to this bug,
the local variable that means "let the host resolve the name" could get the
wrong value during a slow SOCKS5 handshake, and contrary to the intention,
copy the too long host name to the target buffer instead of copying just the
resolved address there.
The target buffer being a heap based buffer, and the host name coming from the
URL that curl has been told to operate with. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-38545 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.2625 |
| scoring_system |
epss |
| scoring_elements |
0.96312 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.2625 |
| scoring_system |
epss |
| scoring_elements |
0.96278 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.2625 |
| scoring_system |
epss |
| scoring_elements |
0.96283 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.2625 |
| scoring_system |
epss |
| scoring_elements |
0.96292 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.2625 |
| scoring_system |
epss |
| scoring_elements |
0.96295 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.2625 |
| scoring_system |
epss |
| scoring_elements |
0.963 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.2625 |
| scoring_system |
epss |
| scoring_elements |
0.96303 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.26747 |
| scoring_system |
epss |
| scoring_elements |
0.96315 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-38545 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
| reference_url |
https://curl.se/docs/CVE-2023-38545.html |
| reference_id |
CVE-2023-38545.HTML |
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
High |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track* |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/ |
|
|
| url |
https://curl.se/docs/CVE-2023-38545.html |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-38545
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tcqe-7skm-b3fz |
|
| 148 |
| url |
VCID-tha5-fv3w-sub6 |
| vulnerability_id |
VCID-tha5-fv3w-sub6 |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-2004 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74722 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74642 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74669 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74644 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74675 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.7469 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74713 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74693 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74685 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-2004 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://curl.se/docs/CVE-2024-2004.html |
| reference_id |
CVE-2024-2004.html |
| reference_type |
|
| scores |
| 0 |
| value |
3.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-2004.html |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-2004
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tha5-fv3w-sub6 |
|
| 149 |
| url |
VCID-tmv3-fzje-sbck |
| vulnerability_id |
VCID-tmv3-fzje-sbck |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which can allow remote attackers to cause Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3148 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01686 |
| scoring_system |
epss |
| scoring_elements |
0.82244 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.01686 |
| scoring_system |
epss |
| scoring_elements |
0.82137 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01686 |
| scoring_system |
epss |
| scoring_elements |
0.8215 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01686 |
| scoring_system |
epss |
| scoring_elements |
0.82172 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01686 |
| scoring_system |
epss |
| scoring_elements |
0.82168 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01686 |
| scoring_system |
epss |
| scoring_elements |
0.82195 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01686 |
| scoring_system |
epss |
| scoring_elements |
0.82202 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01686 |
| scoring_system |
epss |
| scoring_elements |
0.82221 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01686 |
| scoring_system |
epss |
| scoring_elements |
0.82214 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01686 |
| scoring_system |
epss |
| scoring_elements |
0.82208 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3148 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3148
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tmv3-fzje-sbck |
|
| 150 |
| url |
VCID-tz47-j4ey-t7g6 |
| vulnerability_id |
VCID-tz47-j4ey-t7g6 |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could result in a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14618 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65733 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65698 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.006 |
| scoring_system |
epss |
| scoring_elements |
0.69387 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.006 |
| scoring_system |
epss |
| scoring_elements |
0.69398 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.006 |
| scoring_system |
epss |
| scoring_elements |
0.69414 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.006 |
| scoring_system |
epss |
| scoring_elements |
0.69393 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.006 |
| scoring_system |
epss |
| scoring_elements |
0.69444 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.006 |
| scoring_system |
epss |
| scoring_elements |
0.6946 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.006 |
| scoring_system |
epss |
| scoring_elements |
0.69481 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.006 |
| scoring_system |
epss |
| scoring_elements |
0.69466 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-14618 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-14618
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tz47-j4ey-t7g6 |
|
| 151 |
| url |
VCID-u4bx-xqb3-vuef |
| vulnerability_id |
VCID-u4bx-xqb3-vuef |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-2398 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01962 |
| scoring_system |
epss |
| scoring_elements |
0.83544 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.01962 |
| scoring_system |
epss |
| scoring_elements |
0.83457 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01962 |
| scoring_system |
epss |
| scoring_elements |
0.83472 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01962 |
| scoring_system |
epss |
| scoring_elements |
0.8347 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01962 |
| scoring_system |
epss |
| scoring_elements |
0.83495 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01962 |
| scoring_system |
epss |
| scoring_elements |
0.83504 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01962 |
| scoring_system |
epss |
| scoring_elements |
0.83519 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01962 |
| scoring_system |
epss |
| scoring_elements |
0.83512 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01962 |
| scoring_system |
epss |
| scoring_elements |
0.83509 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-2398 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
| reference_url |
https://curl.se/docs/CVE-2024-2398.html |
| reference_id |
CVE-2024-2398.html |
| reference_type |
|
| scores |
| 0 |
| value |
8.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L |
|
| 1 |
| value |
Medium |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-2398.html |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-2398
|
| risk_score |
3.9 |
| exploitability |
0.5 |
| weighted_severity |
7.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-u4bx-xqb3-vuef |
|
| 152 |
| url |
VCID-u9jp-j1ds-73e7 |
| vulnerability_id |
VCID-u9jp-j1ds-73e7 |
| summary |
curl: URL file scheme drive letter buffer overflow |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9502 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68058 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.6808 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68099 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68077 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68128 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68143 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68167 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68154 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68121 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68157 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9502 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9502
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-u9jp-j1ds-73e7 |
|
| 153 |
| url |
VCID-v3qf-6wju-1bg8 |
| vulnerability_id |
VCID-v3qf-6wju-1bg8 |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16890 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01397 |
| scoring_system |
epss |
| scoring_elements |
0.80347 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01397 |
| scoring_system |
epss |
| scoring_elements |
0.80428 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.01397 |
| scoring_system |
epss |
| scoring_elements |
0.80353 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01397 |
| scoring_system |
epss |
| scoring_elements |
0.80373 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01397 |
| scoring_system |
epss |
| scoring_elements |
0.80362 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01397 |
| scoring_system |
epss |
| scoring_elements |
0.80391 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01397 |
| scoring_system |
epss |
| scoring_elements |
0.80402 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01397 |
| scoring_system |
epss |
| scoring_elements |
0.8042 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01397 |
| scoring_system |
epss |
| scoring_elements |
0.80405 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01397 |
| scoring_system |
epss |
| scoring_elements |
0.80398 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-16890 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-16890
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v3qf-6wju-1bg8 |
|
| 154 |
| url |
VCID-v9n1-d6xt-6ubn |
| vulnerability_id |
VCID-v9n1-d6xt-6ubn |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-30115 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.2778 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27873 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27831 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27774 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27925 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27967 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27758 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27826 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27867 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-30115 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-30115
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v9n1-d6xt-6ubn |
|
| 155 |
| url |
VCID-vbbv-k1r7-kkas |
| vulnerability_id |
VCID-vbbv-k1r7-kkas |
| summary |
When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-15224 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24629 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24485 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24667 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24442 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.2451 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24554 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.2457 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.24526 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00084 |
| scoring_system |
epss |
| scoring_elements |
0.2447 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-15224 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-15224
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vbbv-k1r7-kkas |
|
| 156 |
| url |
VCID-vr9x-yqsd-6fc8 |
| vulnerability_id |
VCID-vr9x-yqsd-6fc8 |
| summary |
A heap-based buffer overflow in cURL might allow remote attackers
to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-0500 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01151 |
| scoring_system |
epss |
| scoring_elements |
0.78441 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01151 |
| scoring_system |
epss |
| scoring_elements |
0.78519 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.01151 |
| scoring_system |
epss |
| scoring_elements |
0.78447 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01151 |
| scoring_system |
epss |
| scoring_elements |
0.78478 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01151 |
| scoring_system |
epss |
| scoring_elements |
0.78461 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01151 |
| scoring_system |
epss |
| scoring_elements |
0.78488 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01151 |
| scoring_system |
epss |
| scoring_elements |
0.78493 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01151 |
| scoring_system |
epss |
| scoring_elements |
0.78518 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01151 |
| scoring_system |
epss |
| scoring_elements |
0.78499 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01151 |
| scoring_system |
epss |
| scoring_elements |
0.78491 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-0500 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-0500
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vr9x-yqsd-6fc8 |
|
| 157 |
| url |
VCID-vxpj-xygq-9be2 |
| vulnerability_id |
VCID-vxpj-xygq-9be2 |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8615 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02337 |
| scoring_system |
epss |
| scoring_elements |
0.84774 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02337 |
| scoring_system |
epss |
| scoring_elements |
0.8487 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.02337 |
| scoring_system |
epss |
| scoring_elements |
0.84789 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02337 |
| scoring_system |
epss |
| scoring_elements |
0.84808 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02337 |
| scoring_system |
epss |
| scoring_elements |
0.8481 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02337 |
| scoring_system |
epss |
| scoring_elements |
0.84832 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02337 |
| scoring_system |
epss |
| scoring_elements |
0.84839 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02337 |
| scoring_system |
epss |
| scoring_elements |
0.84857 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02337 |
| scoring_system |
epss |
| scoring_elements |
0.84854 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02337 |
| scoring_system |
epss |
| scoring_elements |
0.84849 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8615 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-8615
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vxpj-xygq-9be2 |
|
| 158 |
| url |
VCID-vyk2-s5ut-ubbz |
| vulnerability_id |
VCID-vyk2-s5ut-ubbz |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8618 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01654 |
| scoring_system |
epss |
| scoring_elements |
0.81967 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01654 |
| scoring_system |
epss |
| scoring_elements |
0.82068 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.01654 |
| scoring_system |
epss |
| scoring_elements |
0.81997 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.01654 |
| scoring_system |
epss |
| scoring_elements |
0.82024 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.01654 |
| scoring_system |
epss |
| scoring_elements |
0.82031 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.01654 |
| scoring_system |
epss |
| scoring_elements |
0.82051 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.01654 |
| scoring_system |
epss |
| scoring_elements |
0.8204 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.01654 |
| scoring_system |
epss |
| scoring_elements |
0.82033 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.01654 |
| scoring_system |
epss |
| scoring_elements |
0.81978 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.01654 |
| scoring_system |
epss |
| scoring_elements |
0.82001 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8618 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-8618
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vyk2-s5ut-ubbz |
|
| 159 |
| url |
VCID-w8ks-xk66-r3fm |
| vulnerability_id |
VCID-w8ks-xk66-r3fm |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could result in a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3823 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01673 |
| scoring_system |
epss |
| scoring_elements |
0.82071 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01673 |
| scoring_system |
epss |
| scoring_elements |
0.82175 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.01673 |
| scoring_system |
epss |
| scoring_elements |
0.82083 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01673 |
| scoring_system |
epss |
| scoring_elements |
0.82104 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01673 |
| scoring_system |
epss |
| scoring_elements |
0.821 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01673 |
| scoring_system |
epss |
| scoring_elements |
0.82126 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01673 |
| scoring_system |
epss |
| scoring_elements |
0.82134 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01673 |
| scoring_system |
epss |
| scoring_elements |
0.82153 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01673 |
| scoring_system |
epss |
| scoring_elements |
0.82144 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01673 |
| scoring_system |
epss |
| scoring_elements |
0.82137 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-3823 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-3823
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w8ks-xk66-r3fm |
|
| 160 |
| url |
VCID-wc8j-qyp4-tqbd |
| vulnerability_id |
VCID-wc8j-qyp4-tqbd |
| summary |
Multiple untrusted search path vulnerabilities in cURL and libcurl before 7.49.1, when built with SSPI or telnet is enabled, allow local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) security.dll, (2) secur32.dll, or (3) ws2_32.dll in the application or current working directory. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4802 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69842 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69815 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.698 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.6974 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69751 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69767 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69743 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69791 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69807 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.6983 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4802 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-4802
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wc8j-qyp4-tqbd |
|
| 161 |
| url |
VCID-wdhs-h36p-qbga |
| vulnerability_id |
VCID-wdhs-h36p-qbga |
| summary |
curl: negotiate not treated as connection-oriented (incomplete fix for CVE-2015-3148) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2628 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74503 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74508 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74535 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74509 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74541 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74557 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74579 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.7456 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74552 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.7459 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2628 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2628
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wdhs-h36p-qbga |
|
| 162 |
| url |
VCID-wgma-bycg-1qb1 |
| vulnerability_id |
VCID-wgma-bycg-1qb1 |
| summary |
curl: curl netrc password leak |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-11053 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76402 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76306 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76336 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76315 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76348 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76362 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76388 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76366 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76361 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-11053 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://curl.se/docs/CVE-2024-11053.html |
| reference_id |
CVE-2024-11053.html |
| reference_type |
|
| scores |
| 0 |
| value |
3.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-15T16:47:42Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-11053.html |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-11053
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wgma-bycg-1qb1 |
|
| 163 |
| url |
VCID-wh98-pw9h-cyfx |
| vulnerability_id |
VCID-wh98-pw9h-cyfx |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which can allow remote attackers to cause Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3145 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.63704 |
| scoring_system |
epss |
| scoring_elements |
0.98425 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.63704 |
| scoring_system |
epss |
| scoring_elements |
0.98404 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.63704 |
| scoring_system |
epss |
| scoring_elements |
0.98407 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.63704 |
| scoring_system |
epss |
| scoring_elements |
0.98409 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.63704 |
| scoring_system |
epss |
| scoring_elements |
0.98412 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.63704 |
| scoring_system |
epss |
| scoring_elements |
0.98415 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.63704 |
| scoring_system |
epss |
| scoring_elements |
0.98416 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.63704 |
| scoring_system |
epss |
| scoring_elements |
0.9842 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3145 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3145
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wh98-pw9h-cyfx |
|
| 164 |
| url |
VCID-wrh2-77dv-hbdz |
| vulnerability_id |
VCID-wrh2-77dv-hbdz |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which may allow execution of arbitrary code. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-8817 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00852 |
| scoring_system |
epss |
| scoring_elements |
0.74872 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00852 |
| scoring_system |
epss |
| scoring_elements |
0.74905 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00852 |
| scoring_system |
epss |
| scoring_elements |
0.74919 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00852 |
| scoring_system |
epss |
| scoring_elements |
0.74941 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00852 |
| scoring_system |
epss |
| scoring_elements |
0.74918 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00852 |
| scoring_system |
epss |
| scoring_elements |
0.7491 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76325 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76291 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76294 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.00981 |
| scoring_system |
epss |
| scoring_elements |
0.76812 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-8817 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-8817
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wrh2-77dv-hbdz |
|
| 165 |
| url |
VCID-wwam-tcmv-kqhc |
| vulnerability_id |
VCID-wwam-tcmv-kqhc |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which may lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-5482 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06912 |
| scoring_system |
epss |
| scoring_elements |
0.91427 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.06912 |
| scoring_system |
epss |
| scoring_elements |
0.91403 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.06912 |
| scoring_system |
epss |
| scoring_elements |
0.91402 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.08332 |
| scoring_system |
epss |
| scoring_elements |
0.92281 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.08332 |
| scoring_system |
epss |
| scoring_elements |
0.9225 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.08332 |
| scoring_system |
epss |
| scoring_elements |
0.92286 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.08332 |
| scoring_system |
epss |
| scoring_elements |
0.92257 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.08332 |
| scoring_system |
epss |
| scoring_elements |
0.92262 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.08332 |
| scoring_system |
epss |
| scoring_elements |
0.92265 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.08332 |
| scoring_system |
epss |
| scoring_elements |
0.92277 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-5482 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-5482
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wwam-tcmv-kqhc |
|
| 166 |
| url |
VCID-x57x-w8g8-7ybz |
| vulnerability_id |
VCID-x57x-w8g8-7ybz |
| summary |
When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-14524 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07128 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.0715 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07177 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07151 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07206 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07237 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07234 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07222 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00026 |
| scoring_system |
epss |
| scoring_elements |
0.07212 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-14524 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-14524
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x57x-w8g8-7ybz |
|
| 167 |
| url |
VCID-xkw8-ptjd-sfb6 |
| vulnerability_id |
VCID-xkw8-ptjd-sfb6 |
| summary |
libcurl is affected by a buffer overflow in the handling of URLs for the
TFTP protocol, which could be exploited to compromise a user's system. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2006-1061 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03827 |
| scoring_system |
epss |
| scoring_elements |
0.88156 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.03827 |
| scoring_system |
epss |
| scoring_elements |
0.88083 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.03827 |
| scoring_system |
epss |
| scoring_elements |
0.88092 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.03827 |
| scoring_system |
epss |
| scoring_elements |
0.88108 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.03827 |
| scoring_system |
epss |
| scoring_elements |
0.88114 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.03827 |
| scoring_system |
epss |
| scoring_elements |
0.88133 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.03827 |
| scoring_system |
epss |
| scoring_elements |
0.88139 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.03827 |
| scoring_system |
epss |
| scoring_elements |
0.88148 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.03827 |
| scoring_system |
epss |
| scoring_elements |
0.88141 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.03827 |
| scoring_system |
epss |
| scoring_elements |
0.88143 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2006-1061 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2006-1061
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xkw8-ptjd-sfb6 |
|
| 168 |
| url |
VCID-xm7g-6w3z-37fs |
| vulnerability_id |
VCID-xm7g-6w3z-37fs |
| summary |
libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-3564 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00635 |
| scoring_system |
epss |
| scoring_elements |
0.70433 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00635 |
| scoring_system |
epss |
| scoring_elements |
0.70329 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00635 |
| scoring_system |
epss |
| scoring_elements |
0.70341 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00635 |
| scoring_system |
epss |
| scoring_elements |
0.70358 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00635 |
| scoring_system |
epss |
| scoring_elements |
0.70336 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00635 |
| scoring_system |
epss |
| scoring_elements |
0.70381 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00635 |
| scoring_system |
epss |
| scoring_elements |
0.70396 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00635 |
| scoring_system |
epss |
| scoring_elements |
0.7042 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00635 |
| scoring_system |
epss |
| scoring_elements |
0.70405 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00635 |
| scoring_system |
epss |
| scoring_elements |
0.7039 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-3564 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-3564
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xm7g-6w3z-37fs |
|
| 169 |
| url |
VCID-xpss-yndr-mycj |
| vulnerability_id |
VCID-xpss-yndr-mycj |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-43551 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.1269 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12923 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12972 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12773 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12852 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12902 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12868 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12831 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12786 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-43551 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-43551
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xpss-yndr-mycj |
|
| 170 |
| url |
VCID-xspf-45t1-2uhf |
| vulnerability_id |
VCID-xspf-45t1-2uhf |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which can allow remote attackers to cause Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3143 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03475 |
| scoring_system |
epss |
| scoring_elements |
0.8757 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.03475 |
| scoring_system |
epss |
| scoring_elements |
0.875 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.03475 |
| scoring_system |
epss |
| scoring_elements |
0.8751 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.03475 |
| scoring_system |
epss |
| scoring_elements |
0.87524 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.03475 |
| scoring_system |
epss |
| scoring_elements |
0.87526 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.03475 |
| scoring_system |
epss |
| scoring_elements |
0.87545 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.03475 |
| scoring_system |
epss |
| scoring_elements |
0.87552 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.03475 |
| scoring_system |
epss |
| scoring_elements |
0.87563 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.03475 |
| scoring_system |
epss |
| scoring_elements |
0.87559 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.03475 |
| scoring_system |
epss |
| scoring_elements |
0.87556 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3143 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3143
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xspf-45t1-2uhf |
|
| 171 |
| url |
VCID-xzay-sjpy-3yce |
| vulnerability_id |
VCID-xzay-sjpy-3yce |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-32206 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04546 |
| scoring_system |
epss |
| scoring_elements |
0.892 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.04546 |
| scoring_system |
epss |
| scoring_elements |
0.89143 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.04546 |
| scoring_system |
epss |
| scoring_elements |
0.89158 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.04546 |
| scoring_system |
epss |
| scoring_elements |
0.89161 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.04546 |
| scoring_system |
epss |
| scoring_elements |
0.89178 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.04546 |
| scoring_system |
epss |
| scoring_elements |
0.89183 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.04546 |
| scoring_system |
epss |
| scoring_elements |
0.89193 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.04546 |
| scoring_system |
epss |
| scoring_elements |
0.89189 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.04546 |
| scoring_system |
epss |
| scoring_elements |
0.89187 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-32206 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-32206
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xzay-sjpy-3yce |
|
| 172 |
| url |
VCID-y32p-52ps-4ug4 |
| vulnerability_id |
VCID-y32p-52ps-4ug4 |
| summary |
Use of Incorrectly-Resolved Name or Reference
libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function does not take `issuercert` into account and it compared the involved paths *case insensitively*, which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn't include the `issuer cert` which a transfer can set to qualify how to verify the server certificate. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22924 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00746 |
| scoring_system |
epss |
| scoring_elements |
0.73012 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00746 |
| scoring_system |
epss |
| scoring_elements |
0.73021 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00746 |
| scoring_system |
epss |
| scoring_elements |
0.73016 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00746 |
| scoring_system |
epss |
| scoring_elements |
0.73107 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00746 |
| scoring_system |
epss |
| scoring_elements |
0.73064 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00746 |
| scoring_system |
epss |
| scoring_elements |
0.7307 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00746 |
| scoring_system |
epss |
| scoring_elements |
0.73091 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00746 |
| scoring_system |
epss |
| scoring_elements |
0.73066 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00746 |
| scoring_system |
epss |
| scoring_elements |
0.73053 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00746 |
| scoring_system |
epss |
| scoring_elements |
0.73042 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22924 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22924
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y32p-52ps-4ug4 |
|
| 173 |
| url |
VCID-y4x5-n5m2-x7bq |
| vulnerability_id |
VCID-y4x5-n5m2-x7bq |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-32208 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37884 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37916 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37942 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37819 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.3787 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37883 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37898 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37862 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00167 |
| scoring_system |
epss |
| scoring_elements |
0.37837 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-32208 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-32208
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y4x5-n5m2-x7bq |
|
| 174 |
| url |
VCID-ya9y-nav3-37hh |
| vulnerability_id |
VCID-ya9y-nav3-37hh |
| summary |
curl and libcurl 7.27.0 through 7.35.0, when using the SecureTransport/Darwinssl backend, as used in in Apple OS X 10.9.x before 10.9.2, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP address, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-1263 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05846 |
| scoring_system |
epss |
| scoring_elements |
0.90563 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.05846 |
| scoring_system |
epss |
| scoring_elements |
0.90504 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.05846 |
| scoring_system |
epss |
| scoring_elements |
0.90508 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.05846 |
| scoring_system |
epss |
| scoring_elements |
0.90519 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.05846 |
| scoring_system |
epss |
| scoring_elements |
0.90525 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.05846 |
| scoring_system |
epss |
| scoring_elements |
0.90538 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.05846 |
| scoring_system |
epss |
| scoring_elements |
0.90544 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.05846 |
| scoring_system |
epss |
| scoring_elements |
0.90552 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.05846 |
| scoring_system |
epss |
| scoring_elements |
0.90546 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-1263 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-1263
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ya9y-nav3-37hh |
|
| 175 |
| url |
VCID-yaas-j3qk-kfdg |
| vulnerability_id |
VCID-yaas-j3qk-kfdg |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-42916 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.25964 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.25934 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.26002 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.26053 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.26063 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.26017 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00093 |
| scoring_system |
epss |
| scoring_elements |
0.25958 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31202 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31155 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-42916 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-42916
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yaas-j3qk-kfdg |
|
| 176 |
| url |
VCID-yubp-g4rt-c3e6 |
| vulnerability_id |
VCID-yubp-g4rt-c3e6 |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which can allow remote attackers to cause Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3236 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04525 |
| scoring_system |
epss |
| scoring_elements |
0.89176 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.04525 |
| scoring_system |
epss |
| scoring_elements |
0.89112 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.04525 |
| scoring_system |
epss |
| scoring_elements |
0.89119 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.04525 |
| scoring_system |
epss |
| scoring_elements |
0.89134 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.04525 |
| scoring_system |
epss |
| scoring_elements |
0.89137 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.04525 |
| scoring_system |
epss |
| scoring_elements |
0.89155 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.04525 |
| scoring_system |
epss |
| scoring_elements |
0.8916 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.04525 |
| scoring_system |
epss |
| scoring_elements |
0.8917 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.04525 |
| scoring_system |
epss |
| scoring_elements |
0.89166 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.04525 |
| scoring_system |
epss |
| scoring_elements |
0.89164 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-3236 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-3236
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yubp-g4rt-c3e6 |
|
| 177 |
| url |
VCID-yvdd-ataf-ckf1 |
| vulnerability_id |
VCID-yvdd-ataf-ckf1 |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could result in information disclosure or data loss. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8231 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00159 |
| scoring_system |
epss |
| scoring_elements |
0.36844 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00159 |
| scoring_system |
epss |
| scoring_elements |
0.36823 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00159 |
| scoring_system |
epss |
| scoring_elements |
0.36798 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44841 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44863 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44803 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44855 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44858 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44875 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44761 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8231 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8231
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yvdd-ataf-ckf1 |
|
| 178 |
| url |
VCID-yxks-8529-23bj |
| vulnerability_id |
VCID-yxks-8529-23bj |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8625 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01526 |
| scoring_system |
epss |
| scoring_elements |
0.81219 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01526 |
| scoring_system |
epss |
| scoring_elements |
0.8132 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.01526 |
| scoring_system |
epss |
| scoring_elements |
0.81228 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01526 |
| scoring_system |
epss |
| scoring_elements |
0.81251 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01526 |
| scoring_system |
epss |
| scoring_elements |
0.8125 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01526 |
| scoring_system |
epss |
| scoring_elements |
0.81278 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01526 |
| scoring_system |
epss |
| scoring_elements |
0.81283 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.01526 |
| scoring_system |
epss |
| scoring_elements |
0.81304 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01526 |
| scoring_system |
epss |
| scoring_elements |
0.8129 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8625 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-8625
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yxks-8529-23bj |
|
| 179 |
| url |
VCID-z49y-v1gh-h7gj |
| vulnerability_id |
VCID-z49y-v1gh-h7gj |
| summary |
Multiple vulnerabilities have been found in cURL, allowing
attackers to execute arbitrary code or cause Denial of Service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2174 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03181 |
| scoring_system |
epss |
| scoring_elements |
0.86981 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.03181 |
| scoring_system |
epss |
| scoring_elements |
0.86912 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.03181 |
| scoring_system |
epss |
| scoring_elements |
0.86923 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.03181 |
| scoring_system |
epss |
| scoring_elements |
0.86942 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.03181 |
| scoring_system |
epss |
| scoring_elements |
0.86936 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.03181 |
| scoring_system |
epss |
| scoring_elements |
0.86956 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.03181 |
| scoring_system |
epss |
| scoring_elements |
0.86963 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.03181 |
| scoring_system |
epss |
| scoring_elements |
0.86977 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.03181 |
| scoring_system |
epss |
| scoring_elements |
0.86971 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.03181 |
| scoring_system |
epss |
| scoring_elements |
0.86966 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2174 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2013-2174
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z49y-v1gh-h7gj |
|
| 180 |
| url |
VCID-z8h3-fdj8-xuaa |
| vulnerability_id |
VCID-z8h3-fdj8-xuaa |
| summary |
Multiple vulnerabilities have been discovered in cURL, the worst of
which could lead to man-in-the-middle attacks. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0138 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00676 |
| scoring_system |
epss |
| scoring_elements |
0.71517 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00676 |
| scoring_system |
epss |
| scoring_elements |
0.71431 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00676 |
| scoring_system |
epss |
| scoring_elements |
0.71439 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00676 |
| scoring_system |
epss |
| scoring_elements |
0.71457 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00676 |
| scoring_system |
epss |
| scoring_elements |
0.71471 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00676 |
| scoring_system |
epss |
| scoring_elements |
0.71483 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00676 |
| scoring_system |
epss |
| scoring_elements |
0.71506 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00676 |
| scoring_system |
epss |
| scoring_elements |
0.7149 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00676 |
| scoring_system |
epss |
| scoring_elements |
0.71472 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0138 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-0138
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z8h3-fdj8-xuaa |
|
| 181 |
| url |
VCID-zxz2-xfpd-pbay |
| vulnerability_id |
VCID-zxz2-xfpd-pbay |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8617 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19573 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19482 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19714 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19763 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19488 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19567 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19619 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19623 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19575 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19517 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-8617 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-8617
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zxz2-xfpd-pbay |
|