| 0 |
| url |
VCID-176a-agbw-hqdy |
| vulnerability_id |
VCID-176a-agbw-hqdy |
| summary |
curl: libcurl: QUIC Certificate Pinning Bypass |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-5025 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18867 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.19129 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18846 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18926 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18979 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18986 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18939 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18888 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18841 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.18854 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.0006 |
| scoring_system |
epss |
| scoring_elements |
0.19078 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-5025 |
|
| 2 |
| reference_url |
https://curl.se/docs/CVE-2025-5025.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N |
|
| 1 |
| value |
Medium |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T16:19:34Z/ |
|
|
| url |
https://curl.se/docs/CVE-2025-5025.html |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-5025
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-176a-agbw-hqdy |
|
| 1 |
| url |
VCID-26p8-15d6-kbb1 |
| vulnerability_id |
VCID-26p8-15d6-kbb1 |
| summary |
libcurl: Double Close of Eventfd in libcurl |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-0665 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04569 |
| scoring_system |
epss |
| scoring_elements |
0.89216 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.04569 |
| scoring_system |
epss |
| scoring_elements |
0.89182 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.04569 |
| scoring_system |
epss |
| scoring_elements |
0.892 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.04569 |
| scoring_system |
epss |
| scoring_elements |
0.89204 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.04569 |
| scoring_system |
epss |
| scoring_elements |
0.89214 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.04569 |
| scoring_system |
epss |
| scoring_elements |
0.8921 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.04569 |
| scoring_system |
epss |
| scoring_elements |
0.89208 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.04569 |
| scoring_system |
epss |
| scoring_elements |
0.89221 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.04569 |
| scoring_system |
epss |
| scoring_elements |
0.8922 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.04569 |
| scoring_system |
epss |
| scoring_elements |
0.89164 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.04569 |
| scoring_system |
epss |
| scoring_elements |
0.89179 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-0665 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-0665
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-26p8-15d6-kbb1 |
|
| 2 |
| url |
VCID-2vwu-y316-gbb2 |
| vulnerability_id |
VCID-2vwu-y316-gbb2 |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-2466 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35416 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35517 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35542 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35424 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.3547 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35495 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35505 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35462 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.3544 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35479 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00149 |
| scoring_system |
epss |
| scoring_elements |
0.35468 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-2466 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://curl.se/docs/CVE-2024-2466.html |
| reference_id |
CVE-2024-2466.html |
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
|
| 1 |
| value |
Medium |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-2466.html |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-2466
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2vwu-y316-gbb2 |
|
| 3 |
| url |
VCID-38mv-usbe-z7hd |
| vulnerability_id |
VCID-38mv-usbe-z7hd |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could result in the arbitrary execution of code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22901 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00212 |
| scoring_system |
epss |
| scoring_elements |
0.43716 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.56921 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57081 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.5706 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57036 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57065 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57062 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57018 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.5704 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57017 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.57068 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00344 |
| scoring_system |
epss |
| scoring_elements |
0.5707 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22901 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22901
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-38mv-usbe-z7hd |
|
| 4 |
| url |
VCID-549m-sm8g-cude |
| vulnerability_id |
VCID-549m-sm8g-cude |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which may allow attackers to bypass intended restrictions. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000099 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.72962 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73064 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.72994 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.7297 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73007 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73021 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73046 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73025 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73019 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73061 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.7307 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.72974 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000099 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-1000099
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-549m-sm8g-cude |
|
| 5 |
| url |
VCID-5g4v-dyse-uucu |
| vulnerability_id |
VCID-5g4v-dyse-uucu |
| summary |
wcurl: wcurl: Arbitrary file placement via crafted URLs |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-11563 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0412 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04239 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0418 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04163 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04137 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04108 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04116 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04138 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04155 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04186 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.04201 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-11563 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-11563
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5g4v-dyse-uucu |
|
| 6 |
| url |
VCID-5xp7-mcsa-uqd4 |
| vulnerability_id |
VCID-5xp7-mcsa-uqd4 |
| summary |
When doing TLS related transfers with reused easy or multi handles and
altering the `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally
reuse a CA store cached in memory for which the partial chain option was
reversed. Contrary to the user's wishes and expectations. This could make
libcurl find and accept a trust chain that it otherwise would not. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-14819 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13995 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1384 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13991 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13948 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13911 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13863 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13771 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13766 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1405 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13854 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13938 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-14819 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-14819
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5xp7-mcsa-uqd4 |
|
| 7 |
| url |
VCID-6ge5-86tg-dydf |
| vulnerability_id |
VCID-6ge5-86tg-dydf |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27779 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50717 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50705 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50731 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50737 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50654 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.5068 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50635 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.5069 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50686 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00273 |
| scoring_system |
epss |
| scoring_elements |
0.50728 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27779 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-27779
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6ge5-86tg-dydf |
|
| 8 |
| url |
VCID-8m6a-ej6a-g3df |
| vulnerability_id |
VCID-8m6a-ej6a-g3df |
| summary |
curl: freeing stack buffer in utf8asn1str |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-6197 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01302 |
| scoring_system |
epss |
| scoring_elements |
0.79769 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01302 |
| scoring_system |
epss |
| scoring_elements |
0.79695 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01302 |
| scoring_system |
epss |
| scoring_elements |
0.79716 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01302 |
| scoring_system |
epss |
| scoring_elements |
0.79701 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01302 |
| scoring_system |
epss |
| scoring_elements |
0.7973 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01302 |
| scoring_system |
epss |
| scoring_elements |
0.79737 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.01302 |
| scoring_system |
epss |
| scoring_elements |
0.79759 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01302 |
| scoring_system |
epss |
| scoring_elements |
0.79743 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01302 |
| scoring_system |
epss |
| scoring_elements |
0.79765 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.01302 |
| scoring_system |
epss |
| scoring_elements |
0.79766 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-6197 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://curl.se/docs/CVE-2024-6197.html |
| reference_id |
CVE-2024-6197.html |
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
Medium |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-24T18:42:30Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-6197.html |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-6197
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8m6a-ej6a-g3df |
|
| 9 |
| url |
VCID-9mjz-apkm-g7h1 |
| vulnerability_id |
VCID-9mjz-apkm-g7h1 |
| summary |
libcurl: curl: QUIC certificate check skip with wolfSSL |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-4947 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22576 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22775 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22565 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22641 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22692 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.2271 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22671 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22613 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22628 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22624 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00075 |
| scoring_system |
epss |
| scoring_elements |
0.22731 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-4947 |
|
| 2 |
| reference_url |
https://curl.se/docs/CVE-2025-4947.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N |
|
| 1 |
| value |
Medium |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T13:57:59Z/ |
|
|
| url |
https://curl.se/docs/CVE-2025-4947.html |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-4947
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9mjz-apkm-g7h1 |
|
| 10 |
| url |
VCID-a9b6-m25r-kygw |
| vulnerability_id |
VCID-a9b6-m25r-kygw |
| summary |
The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, makes it easier for remote attackers to conduct man-in-the-middle attacks via a crafted wildcard SAN in a server certificate, as demonstrated by "*.com." |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-9952 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77072 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77042 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77037 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77078 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.7708 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.76977 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.76983 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77012 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.76993 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77025 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77035 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.01005 |
| scoring_system |
epss |
| scoring_elements |
0.77063 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-9952 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-9952
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a9b6-m25r-kygw |
|
| 11 |
| url |
VCID-amgy-dw6h-6ydf |
| vulnerability_id |
VCID-amgy-dw6h-6ydf |
| summary |
curl: curl: Arbitrary code execution or Denial of Service via use-after-free in SMB request handling |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3805 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05799 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11805 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11837 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11817 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1188 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11667 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11752 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12966 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12823 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12821 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.12921 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3805 |
|
| 2 |
| reference_url |
https://curl.se/docs/CVE-2026-3805.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
Medium |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:45:10Z/ |
|
|
| url |
https://curl.se/docs/CVE-2026-3805.html |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-3805
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-amgy-dw6h-6ydf |
|
| 12 |
| url |
VCID-aua9-4frt-xugf |
| vulnerability_id |
VCID-aua9-4frt-xugf |
| summary |
curl: libcurl: Curl out of bounds read for cookie path |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-9086 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10241 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10177 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10138 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13485 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13412 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14303 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14356 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14302 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14264 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14208 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14098 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-9086 |
|
| 2 |
| reference_url |
https://curl.se/docs/CVE-2025-9086.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-12T17:15:47Z/ |
|
|
| url |
https://curl.se/docs/CVE-2025-9086.html |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-9086
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-aua9-4frt-xugf |
|
| 13 |
| url |
VCID-b69q-9yrr-myf7 |
| vulnerability_id |
VCID-b69q-9yrr-myf7 |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-0853 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36299 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36442 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36475 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.3631 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36358 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36378 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36385 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.3635 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36328 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.3637 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00156 |
| scoring_system |
epss |
| scoring_elements |
0.36353 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-0853 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://curl.se/docs/CVE-2024-0853.html |
| reference_id |
CVE-2024-0853.html |
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:54:33Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-0853.html |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-0853
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b69q-9yrr-myf7 |
|
| 14 |
| url |
VCID-bz4u-6rft-s3a8 |
| vulnerability_id |
VCID-bz4u-6rft-s3a8 |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-38039 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.12305 |
| scoring_system |
epss |
| scoring_elements |
0.93847 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.12305 |
| scoring_system |
epss |
| scoring_elements |
0.9386 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.12305 |
| scoring_system |
epss |
| scoring_elements |
0.93856 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.12305 |
| scoring_system |
epss |
| scoring_elements |
0.93845 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.12305 |
| scoring_system |
epss |
| scoring_elements |
0.93835 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.12305 |
| scoring_system |
epss |
| scoring_elements |
0.93894 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.12305 |
| scoring_system |
epss |
| scoring_elements |
0.93893 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.12305 |
| scoring_system |
epss |
| scoring_elements |
0.93887 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.12305 |
| scoring_system |
epss |
| scoring_elements |
0.93865 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-38039 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-38039
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bz4u-6rft-s3a8 |
|
| 15 |
| url |
VCID-d3s1-3qs7-2uhw |
| vulnerability_id |
VCID-d3s1-3qs7-2uhw |
| summary |
curl: Cipher settings shared for all connections when using schannel TLS backed |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22897 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73845 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73937 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73936 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73945 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73855 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.7388 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73851 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73886 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73899 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73921 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73903 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00791 |
| scoring_system |
epss |
| scoring_elements |
0.73894 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22897 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22897
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d3s1-3qs7-2uhw |
|
| 16 |
| url |
VCID-ej47-4dcu-5fhy |
| vulnerability_id |
VCID-ej47-4dcu-5fhy |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-42915 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00467 |
| scoring_system |
epss |
| scoring_elements |
0.64447 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00467 |
| scoring_system |
epss |
| scoring_elements |
0.64436 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00467 |
| scoring_system |
epss |
| scoring_elements |
0.64407 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00467 |
| scoring_system |
epss |
| scoring_elements |
0.64442 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00467 |
| scoring_system |
epss |
| scoring_elements |
0.64454 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00625 |
| scoring_system |
epss |
| scoring_elements |
0.70128 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00625 |
| scoring_system |
epss |
| scoring_elements |
0.70143 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00812 |
| scoring_system |
epss |
| scoring_elements |
0.74203 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00812 |
| scoring_system |
epss |
| scoring_elements |
0.74272 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00812 |
| scoring_system |
epss |
| scoring_elements |
0.7425 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00812 |
| scoring_system |
epss |
| scoring_elements |
0.74235 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-42915 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-42915
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ej47-4dcu-5fhy |
|
| 17 |
| url |
VCID-hj8v-tgnn-mfdw |
| vulnerability_id |
VCID-hj8v-tgnn-mfdw |
| summary |
The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, allows remote attackers to obtain sensitive information, cause a denial of service (crash), or possibly have unspecified other impact via a wildcard certificate name, which triggers an out-of-bounds read. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-9953 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01854 |
| scoring_system |
epss |
| scoring_elements |
0.83051 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01854 |
| scoring_system |
epss |
| scoring_elements |
0.82946 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01854 |
| scoring_system |
epss |
| scoring_elements |
0.82963 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01854 |
| scoring_system |
epss |
| scoring_elements |
0.82976 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01854 |
| scoring_system |
epss |
| scoring_elements |
0.82973 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01854 |
| scoring_system |
epss |
| scoring_elements |
0.82998 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01854 |
| scoring_system |
epss |
| scoring_elements |
0.83005 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01854 |
| scoring_system |
epss |
| scoring_elements |
0.83021 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01854 |
| scoring_system |
epss |
| scoring_elements |
0.83015 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01854 |
| scoring_system |
epss |
| scoring_elements |
0.8301 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01854 |
| scoring_system |
epss |
| scoring_elements |
0.83049 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01854 |
| scoring_system |
epss |
| scoring_elements |
0.83048 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-9953 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-9953
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hj8v-tgnn-mfdw |
|
| 18 |
| url |
VCID-hjkx-6yep-mkde |
| vulnerability_id |
VCID-hjkx-6yep-mkde |
| summary |
curl: removes wrong file on error |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27778 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75845 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75818 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75856 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75859 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75764 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75796 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75776 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75808 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.7582 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75844 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00911 |
| scoring_system |
epss |
| scoring_elements |
0.75825 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27778 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-27778
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hjkx-6yep-mkde |
|
| 19 |
| url |
VCID-hudt-78dw-tkf2 |
| vulnerability_id |
VCID-hudt-78dw-tkf2 |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22925 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54986 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.5496 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.5489 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.55017 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.55005 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.54956 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00319 |
| scoring_system |
epss |
| scoring_elements |
0.55006 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62217 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62207 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62224 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62194 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62173 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-22925 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-22925
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hudt-78dw-tkf2 |
|
| 20 |
| url |
VCID-hyqp-z8hb-fqbt |
| vulnerability_id |
VCID-hyqp-z8hb-fqbt |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-9594 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77857 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77946 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77864 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77892 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77874 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77901 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77906 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77933 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77917 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77916 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77954 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77953 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-9594 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-9594
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hyqp-z8hb-fqbt |
|
| 21 |
| url |
VCID-ke81-x2ze-rbc5 |
| vulnerability_id |
VCID-ke81-x2ze-rbc5 |
| summary |
Double Free
A double free vulnerability exists in libcurl <8.0.0 when sharing HSTS data between separate "handles". This sharing was introduced without considerations for do this sharing across separate threads but there was no indication of this fact in the documentation. Due to missing mutexes or thread locks, two threads sharing the same HSTS data could end up doing a double-free or use-after-free. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-27537 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14558 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14539 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14609 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14418 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14504 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00047 |
| scoring_system |
epss |
| scoring_elements |
0.14506 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.1908 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21707 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00071 |
| scoring_system |
epss |
| scoring_elements |
0.21741 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24345 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24288 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-27537 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-27537
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ke81-x2ze-rbc5 |
|
| 22 |
| url |
VCID-ksap-zrmb-ebcu |
| vulnerability_id |
VCID-ksap-zrmb-ebcu |
| summary |
curl: predictable WebSocket mask |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-10148 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28161 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28205 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.29742 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.29698 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30659 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30746 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30749 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30704 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30683 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30714 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-10148 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-10148
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ksap-zrmb-ebcu |
|
| 23 |
| url |
VCID-kt4b-7ffh-4bch |
| vulnerability_id |
VCID-kt4b-7ffh-4bch |
| summary |
When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey`
with the curl tool,curl should check the public key of the server certificate
to verify the peer.
This check was skipped in a certain condition that would then make curl allow
the connection without performing the proper check, thus not noticing a
possible impostor. To skip this check, the connection had to be done with QUIC
with ngtcp2 built to use GnuTLS and the user had to explicitly disable the
standard certificate verification. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-13034 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01204 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01284 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0123 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01213 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01207 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01209 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.012 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01212 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01211 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.0122 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01226 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-13034 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-13034
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kt4b-7ffh-4bch |
|
| 24 |
| url |
VCID-m15r-v9sr-2bbn |
| vulnerability_id |
VCID-m15r-v9sr-2bbn |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28319 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55117 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55072 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55097 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55073 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55122 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55134 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55114 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0032 |
| scoring_system |
epss |
| scoring_elements |
0.55138 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-28319 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-28319
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m15r-v9sr-2bbn |
|
| 25 |
| url |
VCID-m3nh-aha9-dfbc |
| vulnerability_id |
VCID-m3nh-aha9-dfbc |
| summary |
Absolute path traversal vulnerability in curl 7.20.0 through 7.21.1, when the --remote-header-name or -J option is used, allows remote servers to create or overwrite arbitrary files by using \ (backslash) as a separator of path components within the Content-disposition HTTP header. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-3842 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00898 |
| scoring_system |
epss |
| scoring_elements |
0.75675 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00898 |
| scoring_system |
epss |
| scoring_elements |
0.7569 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00898 |
| scoring_system |
epss |
| scoring_elements |
0.7559 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00898 |
| scoring_system |
epss |
| scoring_elements |
0.75592 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00898 |
| scoring_system |
epss |
| scoring_elements |
0.75623 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00898 |
| scoring_system |
epss |
| scoring_elements |
0.75603 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00898 |
| scoring_system |
epss |
| scoring_elements |
0.75638 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00898 |
| scoring_system |
epss |
| scoring_elements |
0.75649 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00898 |
| scoring_system |
epss |
| scoring_elements |
0.75673 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00898 |
| scoring_system |
epss |
| scoring_elements |
0.75655 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00898 |
| scoring_system |
epss |
| scoring_elements |
0.75686 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-3842 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2010-3842
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m3nh-aha9-dfbc |
|
| 26 |
| url |
VCID-m3r3-25yq-hqdc |
| vulnerability_id |
VCID-m3r3-25yq-hqdc |
| summary |
Curl before 7.49.1 in Apple OS X before macOS Sierra prior to 10.12 allows remote or local attackers to execute arbitrary code, gain sensitive information, cause denial-of-service conditions, bypass security restrictions, and perform unauthorized actions. This may aid in other attacks. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4606 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44368 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44439 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.4446 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44395 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44446 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44453 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.4447 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44438 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44437 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44494 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44484 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00218 |
| scoring_system |
epss |
| scoring_elements |
0.44415 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4606 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-4606
|
| risk_score |
null |
| exploitability |
null |
| weighted_severity |
null |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m3r3-25yq-hqdc |
|
| 27 |
| url |
VCID-m5fs-um7r-9qh2 |
| vulnerability_id |
VCID-m5fs-um7r-9qh2 |
| summary |
curl: libcurl: WebSocket endless loop |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-5399 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0021 |
| scoring_system |
epss |
| scoring_elements |
0.43448 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65399 |
| published_at |
2026-04-21T12:55:00Z |
|
| 2 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65362 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65326 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65378 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65389 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65409 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65396 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65368 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65404 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00486 |
| scoring_system |
epss |
| scoring_elements |
0.65415 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-5399 |
|
| 2 |
| reference_url |
https://curl.se/docs/CVE-2025-5399.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T13:20:18Z/ |
|
|
| url |
https://curl.se/docs/CVE-2025-5399.html |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-5399
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m5fs-um7r-9qh2 |
|
| 28 |
| url |
VCID-ma8s-he6x-z7a8 |
| vulnerability_id |
VCID-ma8s-he6x-z7a8 |
| summary |
curl and libcurl 7.27.0 through 7.35.0, when running on Windows and using the SChannel/Winssl TLS backend, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP address, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-2522 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52591 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52452 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52498 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52525 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52491 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52544 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52539 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.5259 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52574 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52559 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52599 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52605 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-2522 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-2522
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ma8s-he6x-z7a8 |
|
| 29 |
| url |
VCID-my7a-jeng-5bhw |
| vulnerability_id |
VCID-my7a-jeng-5bhw |
| summary |
curl: macidn punycode buffer overread |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-6874 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0099 |
| scoring_system |
epss |
| scoring_elements |
0.76917 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.0099 |
| scoring_system |
epss |
| scoring_elements |
0.76826 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0099 |
| scoring_system |
epss |
| scoring_elements |
0.76855 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0099 |
| scoring_system |
epss |
| scoring_elements |
0.76835 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0099 |
| scoring_system |
epss |
| scoring_elements |
0.76866 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0099 |
| scoring_system |
epss |
| scoring_elements |
0.76877 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0099 |
| scoring_system |
epss |
| scoring_elements |
0.76905 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0099 |
| scoring_system |
epss |
| scoring_elements |
0.76884 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0099 |
| scoring_system |
epss |
| scoring_elements |
0.76879 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0099 |
| scoring_system |
epss |
| scoring_elements |
0.7692 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0099 |
| scoring_system |
epss |
| scoring_elements |
0.76925 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-6874 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://curl.se/docs/CVE-2024-6874.html |
| reference_id |
CVE-2024-6874.html |
| reference_type |
|
| scores |
| 0 |
| value |
3.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T16:13:40Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-6874.html |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-6874
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-my7a-jeng-5bhw |
|
| 30 |
| url |
VCID-qpfa-s6sd-8yct |
| vulnerability_id |
VCID-qpfa-s6sd-8yct |
| summary |
curl: Windows OpenSSL engine code injection |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-5443 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76186 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00935 |
| scoring_system |
epss |
| scoring_elements |
0.76205 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.7635 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76379 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76359 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76392 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76405 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76431 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76409 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76404 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76444 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00953 |
| scoring_system |
epss |
| scoring_elements |
0.76346 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-5443 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-5443
|
| risk_score |
3.8 |
| exploitability |
0.5 |
| weighted_severity |
7.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qpfa-s6sd-8yct |
|
| 31 |
| url |
VCID-rg54-svzj-x7f9 |
| vulnerability_id |
VCID-rg54-svzj-x7f9 |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-35260 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.3993 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39957 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41282 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41341 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41333 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41362 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48647 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48632 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48645 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.48694 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00253 |
| scoring_system |
epss |
| scoring_elements |
0.4869 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-35260 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-35260
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rg54-svzj-x7f9 |
|
| 32 |
| url |
VCID-rhxh-77pj-1bfy |
| vulnerability_id |
VCID-rhxh-77pj-1bfy |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27780 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36599 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36779 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36615 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36667 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36683 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36692 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36658 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36632 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36677 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36659 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00158 |
| scoring_system |
epss |
| scoring_elements |
0.36748 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-27780 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-27780
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rhxh-77pj-1bfy |
|
| 33 |
| url |
VCID-snaz-pg1h-8kew |
| vulnerability_id |
VCID-snaz-pg1h-8kew |
| summary |
cURL before 7.47.0 on Windows allows attackers to write to arbitrary files in the current working directory on a different drive via a colon in a remote file name. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-0754 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00351 |
| scoring_system |
epss |
| scoring_elements |
0.57537 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00351 |
| scoring_system |
epss |
| scoring_elements |
0.57561 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00351 |
| scoring_system |
epss |
| scoring_elements |
0.57557 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00351 |
| scoring_system |
epss |
| scoring_elements |
0.57423 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00351 |
| scoring_system |
epss |
| scoring_elements |
0.57507 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00351 |
| scoring_system |
epss |
| scoring_elements |
0.57528 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00351 |
| scoring_system |
epss |
| scoring_elements |
0.57504 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00351 |
| scoring_system |
epss |
| scoring_elements |
0.57556 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00351 |
| scoring_system |
epss |
| scoring_elements |
0.5756 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00351 |
| scoring_system |
epss |
| scoring_elements |
0.57575 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00351 |
| scoring_system |
epss |
| scoring_elements |
0.57555 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00351 |
| scoring_system |
epss |
| scoring_elements |
0.57533 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-0754 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-0754
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-snaz-pg1h-8kew |
|
| 34 |
| url |
VCID-t753-w1ha-kqaz |
| vulnerability_id |
VCID-t753-w1ha-kqaz |
| summary |
Multiple vulnerabilities have been found in cURL, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-8151 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62225 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62074 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62134 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62166 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62184 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62202 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.6222 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.6221 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62189 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62234 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00424 |
| scoring_system |
epss |
| scoring_elements |
0.62241 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-8151 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-8151
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t753-w1ha-kqaz |
|
| 35 |
| url |
VCID-t9p4-2x7v-yfaq |
| vulnerability_id |
VCID-t9p4-2x7v-yfaq |
| summary |
|
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-0167 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00331 |
| scoring_system |
epss |
| scoring_elements |
0.56114 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00331 |
| scoring_system |
epss |
| scoring_elements |
0.56103 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00331 |
| scoring_system |
epss |
| scoring_elements |
0.56112 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00331 |
| scoring_system |
epss |
| scoring_elements |
0.56109 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00331 |
| scoring_system |
epss |
| scoring_elements |
0.56074 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00331 |
| scoring_system |
epss |
| scoring_elements |
0.56091 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56809 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56789 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.5681 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56786 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56838 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-0167 |
|
| 1 |
| reference_url |
https://curl.se/docs/CVE-2025-0167.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
3.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-05T15:52:41Z/ |
|
|
| url |
https://curl.se/docs/CVE-2025-0167.html |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-0167
|
| risk_score |
1.4 |
| exploitability |
0.5 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t9p4-2x7v-yfaq |
|
| 36 |
| url |
VCID-tha5-fv3w-sub6 |
| vulnerability_id |
VCID-tha5-fv3w-sub6 |
| summary |
Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-2004 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.7472 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74642 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74669 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74644 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74675 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.7469 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74713 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74693 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74685 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74722 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00838 |
| scoring_system |
epss |
| scoring_elements |
0.74729 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-2004 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
| reference_url |
https://curl.se/docs/CVE-2024-2004.html |
| reference_id |
CVE-2024-2004.html |
| reference_type |
|
| scores |
| 0 |
| value |
3.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-2004.html |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-2004
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tha5-fv3w-sub6 |
|
| 37 |
| url |
VCID-u9jp-j1ds-73e7 |
| vulnerability_id |
VCID-u9jp-j1ds-73e7 |
| summary |
curl: URL file scheme drive letter buffer overflow |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9502 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68058 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.6808 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68099 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68077 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68128 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68143 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68167 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68154 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68121 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68157 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.6817 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00555 |
| scoring_system |
epss |
| scoring_elements |
0.68152 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9502 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9502
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-u9jp-j1ds-73e7 |
|
| 38 |
| url |
VCID-v9n1-d6xt-6ubn |
| vulnerability_id |
VCID-v9n1-d6xt-6ubn |
| summary |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-30115 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27713 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27774 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.2778 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27755 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27925 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27967 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27758 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27826 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27867 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27873 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00101 |
| scoring_system |
epss |
| scoring_elements |
0.27831 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-30115 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-30115
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v9n1-d6xt-6ubn |
|
| 39 |
| url |
VCID-wc8j-qyp4-tqbd |
| vulnerability_id |
VCID-wc8j-qyp4-tqbd |
| summary |
Multiple untrusted search path vulnerabilities in cURL and libcurl before 7.49.1, when built with SSPI or telnet is enabled, allow local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) security.dll, (2) secur32.dll, or (3) ws2_32.dll in the application or current working directory. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4802 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69833 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69842 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69852 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.6974 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69751 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69767 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69743 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69791 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69807 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.6983 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.69815 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00612 |
| scoring_system |
epss |
| scoring_elements |
0.698 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4802 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-4802
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wc8j-qyp4-tqbd |
|
| 40 |
| url |
VCID-wdhs-h36p-qbga |
| vulnerability_id |
VCID-wdhs-h36p-qbga |
| summary |
curl: negotiate not treated as connection-oriented (incomplete fix for CVE-2015-3148) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2628 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74503 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74508 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74535 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74509 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74541 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74557 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74579 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.7456 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74552 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.7459 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74597 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00831 |
| scoring_system |
epss |
| scoring_elements |
0.74589 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-2628 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-2628
|
| risk_score |
2.1 |
| exploitability |
0.5 |
| weighted_severity |
4.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wdhs-h36p-qbga |
|
| 41 |
| url |
VCID-wgma-bycg-1qb1 |
| vulnerability_id |
VCID-wgma-bycg-1qb1 |
| summary |
curl: curl netrc password leak |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-11053 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76393 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76315 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76348 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76362 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76388 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76366 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76361 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76402 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76408 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76306 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00949 |
| scoring_system |
epss |
| scoring_elements |
0.76336 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-11053 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://curl.se/docs/CVE-2024-11053.html |
| reference_id |
CVE-2024-11053.html |
| reference_type |
|
| scores |
| 0 |
| value |
3.4 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N |
|
| 1 |
| value |
Low |
| scoring_system |
cvssv3.1 |
| scoring_elements |
|
|
| 2 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-15T16:47:42Z/ |
|
|
| url |
https://curl.se/docs/CVE-2024-11053.html |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-11053
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wgma-bycg-1qb1 |
|
| 42 |
| url |
VCID-ya9y-nav3-37hh |
| vulnerability_id |
VCID-ya9y-nav3-37hh |
| summary |
curl and libcurl 7.27.0 through 7.35.0, when using the SecureTransport/Darwinssl backend, as used in in Apple OS X 10.9.x before 10.9.2, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP address, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-1263 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05846 |
| scoring_system |
epss |
| scoring_elements |
0.90562 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.05846 |
| scoring_system |
epss |
| scoring_elements |
0.90504 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.05846 |
| scoring_system |
epss |
| scoring_elements |
0.90508 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.05846 |
| scoring_system |
epss |
| scoring_elements |
0.90519 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.05846 |
| scoring_system |
epss |
| scoring_elements |
0.90525 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.05846 |
| scoring_system |
epss |
| scoring_elements |
0.90538 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.05846 |
| scoring_system |
epss |
| scoring_elements |
0.90544 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.05846 |
| scoring_system |
epss |
| scoring_elements |
0.90552 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.05846 |
| scoring_system |
epss |
| scoring_elements |
0.90546 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.05846 |
| scoring_system |
epss |
| scoring_elements |
0.90563 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-1263 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2014-1263
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ya9y-nav3-37hh |
|