Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u5?distro=trixie
Typedeb
Namespacedebian
Namecurl
Version7.74.0-1.3+deb11u5
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version7.74.0-1.3+deb11u7
Latest_non_vulnerable_version8.20.0~rc2-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-9ggp-5wfj-ufcq
vulnerability_id VCID-9ggp-5wfj-ufcq
summary Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43552.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43552.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-43552
reference_id
reference_type
scores
0
value 0.00203
scoring_system epss
scoring_elements 0.42433
published_at 2026-04-18T12:55:00Z
1
value 0.00203
scoring_system epss
scoring_elements 0.42428
published_at 2026-04-02T12:55:00Z
2
value 0.00203
scoring_system epss
scoring_elements 0.42458
published_at 2026-04-16T12:55:00Z
3
value 0.00203
scoring_system epss
scoring_elements 0.42397
published_at 2026-04-07T12:55:00Z
4
value 0.00203
scoring_system epss
scoring_elements 0.42447
published_at 2026-04-08T12:55:00Z
5
value 0.00203
scoring_system epss
scoring_elements 0.42455
published_at 2026-04-09T12:55:00Z
6
value 0.00203
scoring_system epss
scoring_elements 0.42477
published_at 2026-04-11T12:55:00Z
7
value 0.00203
scoring_system epss
scoring_elements 0.4244
published_at 2026-04-12T12:55:00Z
8
value 0.00203
scoring_system epss
scoring_elements 0.42409
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-43552
2
reference_url https://curl.se/docs/CVE-2022-43552.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-43552.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://hackerone.com/reports/1764858
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/
url https://hackerone.com/reports/1764858
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026830
reference_id 1026830
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026830
8
reference_url http://seclists.org/fulldisclosure/2023/Mar/17
reference_id 17
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/
url http://seclists.org/fulldisclosure/2023/Mar/17
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2152652
reference_id 2152652
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2152652
10
reference_url https://security.gentoo.org/glsa/202310-12
reference_id GLSA-202310-12
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/
url https://security.gentoo.org/glsa/202310-12
11
reference_url https://support.apple.com/kb/HT213670
reference_id HT213670
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/
url https://support.apple.com/kb/HT213670
12
reference_url https://security.netapp.com/advisory/ntap-20230214-0002/
reference_id ntap-20230214-0002
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/
url https://security.netapp.com/advisory/ntap-20230214-0002/
13
reference_url https://access.redhat.com/errata/RHSA-2023:2478
reference_id RHSA-2023:2478
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2478
14
reference_url https://access.redhat.com/errata/RHSA-2023:2963
reference_id RHSA-2023:2963
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2963
15
reference_url https://access.redhat.com/errata/RHSA-2023:3354
reference_id RHSA-2023:3354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3354
16
reference_url https://access.redhat.com/errata/RHSA-2023:3355
reference_id RHSA-2023:3355
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3355
17
reference_url https://access.redhat.com/errata/RHSA-2023:7743
reference_id RHSA-2023:7743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7743
18
reference_url https://access.redhat.com/errata/RHSA-2024:0428
reference_id RHSA-2024:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0428
19
reference_url https://usn.ubuntu.com/5788-1/
reference_id USN-5788-1
reference_type
scores
url https://usn.ubuntu.com/5788-1/
20
reference_url https://usn.ubuntu.com/5894-1/
reference_id USN-5894-1
reference_type
scores
url https://usn.ubuntu.com/5894-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u5%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.86.0-3?distro=trixie
purl pkg:deb/debian/curl@7.86.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.86.0-3%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
7
url pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie
purl pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie
aliases CVE-2022-43552
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ggp-5wfj-ufcq
1
url VCID-9nak-pscy-e7gs
vulnerability_id VCID-9nak-pscy-e7gs
summary Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32221.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32221.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32221
reference_id
reference_type
scores
0
value 0.01681
scoring_system epss
scoring_elements 0.82218
published_at 2026-04-18T12:55:00Z
1
value 0.01681
scoring_system epss
scoring_elements 0.82185
published_at 2026-04-12T12:55:00Z
2
value 0.01681
scoring_system epss
scoring_elements 0.82179
published_at 2026-04-13T12:55:00Z
3
value 0.02591
scoring_system epss
scoring_elements 0.8553
published_at 2026-04-02T12:55:00Z
4
value 0.02591
scoring_system epss
scoring_elements 0.85547
published_at 2026-04-04T12:55:00Z
5
value 0.02753
scoring_system epss
scoring_elements 0.85998
published_at 2026-04-09T12:55:00Z
6
value 0.02753
scoring_system epss
scoring_elements 0.86012
published_at 2026-04-11T12:55:00Z
7
value 0.02753
scoring_system epss
scoring_elements 0.85988
published_at 2026-04-08T12:55:00Z
8
value 0.02753
scoring_system epss
scoring_elements 0.85969
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32221
2
reference_url https://curl.se/docs/CVE-2022-32221.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2022-32221.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://hackerone.com/reports/1704017
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://hackerone.com/reports/1704017
7
reference_url http://seclists.org/fulldisclosure/2023/Jan/19
reference_id 19
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url http://seclists.org/fulldisclosure/2023/Jan/19
8
reference_url http://seclists.org/fulldisclosure/2023/Jan/20
reference_id 20
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url http://seclists.org/fulldisclosure/2023/Jan/20
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2135411
reference_id 2135411
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2135411
10
reference_url http://www.openwall.com/lists/oss-security/2023/05/17/4
reference_id 4
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url http://www.openwall.com/lists/oss-security/2023/05/17/4
11
reference_url https://www.debian.org/security/2023/dsa-5330
reference_id dsa-5330
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://www.debian.org/security/2023/dsa-5330
12
reference_url https://security.gentoo.org/glsa/202212-01
reference_id GLSA-202212-01
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://security.gentoo.org/glsa/202212-01
13
reference_url https://support.apple.com/kb/HT213604
reference_id HT213604
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://support.apple.com/kb/HT213604
14
reference_url https://support.apple.com/kb/HT213605
reference_id HT213605
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://support.apple.com/kb/HT213605
15
reference_url https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html
reference_id msg00028.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html
16
reference_url https://security.netapp.com/advisory/ntap-20230110-0006/
reference_id ntap-20230110-0006
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://security.netapp.com/advisory/ntap-20230110-0006/
17
reference_url https://security.netapp.com/advisory/ntap-20230208-0002/
reference_id ntap-20230208-0002
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/
url https://security.netapp.com/advisory/ntap-20230208-0002/
18
reference_url https://access.redhat.com/errata/RHSA-2022:8840
reference_id RHSA-2022:8840
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8840
19
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
20
reference_url https://access.redhat.com/errata/RHSA-2023:0333
reference_id RHSA-2023:0333
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0333
21
reference_url https://access.redhat.com/errata/RHSA-2023:4139
reference_id RHSA-2023:4139
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4139
22
reference_url https://usn.ubuntu.com/5702-1/
reference_id USN-5702-1
reference_type
scores
url https://usn.ubuntu.com/5702-1/
23
reference_url https://usn.ubuntu.com/5702-2/
reference_id USN-5702-2
reference_type
scores
url https://usn.ubuntu.com/5702-2/
24
reference_url https://usn.ubuntu.com/5823-1/
reference_id USN-5823-1
reference_type
scores
url https://usn.ubuntu.com/5823-1/
fixed_packages
0
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u5%3Fdistro=trixie
1
url pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
purl pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-4e1k-7bj9-hfch
3
vulnerability VCID-4gze-cwtp-2bgr
4
vulnerability VCID-4seq-hvbx-7fg8
5
vulnerability VCID-56wg-yafz-gkgx
6
vulnerability VCID-6we4-n888-6qhe
7
vulnerability VCID-8zks-th64-33b8
8
vulnerability VCID-ddgz-rczw-jqfw
9
vulnerability VCID-etzn-uhck-h7b2
10
vulnerability VCID-mkyr-w79c-qqfz
11
vulnerability VCID-nvzd-v3bs-6qek
12
vulnerability VCID-pwn6-j8vf-rufk
13
vulnerability VCID-qbpd-star-6fgn
14
vulnerability VCID-qpux-jh6k-8qhx
15
vulnerability VCID-vbbv-k1r7-kkas
16
vulnerability VCID-x57x-w8g8-7ybz
17
vulnerability VCID-xpss-yndr-mycj
18
vulnerability VCID-yaas-j3qk-kfdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie
2
url pkg:deb/debian/curl@7.86.0-1?distro=trixie
purl pkg:deb/debian/curl@7.86.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.86.0-1%3Fdistro=trixie
3
url pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
purl pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-2szj-xvgq-pkfr
2
vulnerability VCID-5xp7-mcsa-uqd4
3
vulnerability VCID-6we4-n888-6qhe
4
vulnerability VCID-8zks-th64-33b8
5
vulnerability VCID-etzn-uhck-h7b2
6
vulnerability VCID-ksap-zrmb-ebcu
7
vulnerability VCID-mkyr-w79c-qqfz
8
vulnerability VCID-nvzd-v3bs-6qek
9
vulnerability VCID-qpux-jh6k-8qhx
10
vulnerability VCID-vbbv-k1r7-kkas
11
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie
4
url pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2cx5-1qnw-uufj
1
vulnerability VCID-5xp7-mcsa-uqd4
2
vulnerability VCID-8zks-th64-33b8
3
vulnerability VCID-amgy-dw6h-6ydf
4
vulnerability VCID-etzn-uhck-h7b2
5
vulnerability VCID-kt4b-7ffh-4bch
6
vulnerability VCID-mkyr-w79c-qqfz
7
vulnerability VCID-nvzd-v3bs-6qek
8
vulnerability VCID-qpux-jh6k-8qhx
9
vulnerability VCID-vbbv-k1r7-kkas
10
vulnerability VCID-x57x-w8g8-7ybz
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/curl@8.19.0-1?distro=trixie
purl pkg:deb/debian/curl@8.19.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie
6
url pkg:deb/debian/curl@8.19.0-3?distro=trixie
purl pkg:deb/debian/curl@8.19.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie
7
url pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie
purl pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie
aliases CVE-2022-32221
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9nak-pscy-e7gs
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u5%3Fdistro=trixie