Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/net-misc/curl@7.52.1
Typeebuild
Namespacenet-misc
Namecurl
Version7.52.1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version7.53.0
Latest_non_vulnerable_version8.7.1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-5jan-pqf6-fyhr
vulnerability_id VCID-5jan-pqf6-fyhr
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8622.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8622.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8622
reference_id
reference_type
scores
0
value 0.01634
scoring_system epss
scoring_elements 0.81845
published_at 2026-04-01T12:55:00Z
1
value 0.01634
scoring_system epss
scoring_elements 0.81915
published_at 2026-04-12T12:55:00Z
2
value 0.01634
scoring_system epss
scoring_elements 0.81911
published_at 2026-04-13T12:55:00Z
3
value 0.01634
scoring_system epss
scoring_elements 0.81947
published_at 2026-04-16T12:55:00Z
4
value 0.01634
scoring_system epss
scoring_elements 0.81856
published_at 2026-04-02T12:55:00Z
5
value 0.01634
scoring_system epss
scoring_elements 0.81879
published_at 2026-04-04T12:55:00Z
6
value 0.01634
scoring_system epss
scoring_elements 0.81875
published_at 2026-04-07T12:55:00Z
7
value 0.01634
scoring_system epss
scoring_elements 0.81901
published_at 2026-04-08T12:55:00Z
8
value 0.01634
scoring_system epss
scoring_elements 0.81908
published_at 2026-04-09T12:55:00Z
9
value 0.01634
scoring_system epss
scoring_elements 0.81927
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8622
2
reference_url https://curl.se/docs/CVE-2016-8622.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8622.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url http://www.securitytracker.com/id/1037192
reference_id 1037192
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:54:47Z/
url http://www.securitytracker.com/id/1037192
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388386
reference_id 1388386
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388386
16
reference_url http://www.securityfocus.com/bid/94105
reference_id 94105
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:54:47Z/
url http://www.securityfocus.com/bid/94105
17
reference_url https://curl.haxx.se/docs/adv_20161102H.html
reference_id adv_20161102H.html
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:54:47Z/
url https://curl.haxx.se/docs/adv_20161102H.html
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
20
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
21
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
22
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
23
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
24
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:54:47Z/
url https://security.gentoo.org/glsa/201701-47
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622
reference_id show_bug.cgi?id=CVE-2016-8622
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:54:47Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622
26
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:ebuild/net-misc/curl@7.52.1
purl pkg:ebuild/net-misc/curl@7.52.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1
aliases CVE-2016-8622
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5jan-pqf6-fyhr
1
url VCID-6muy-xpdq-9kg8
vulnerability_id VCID-6muy-xpdq-9kg8
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8616.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8616.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8616
reference_id
reference_type
scores
0
value 0.0413
scoring_system epss
scoring_elements 0.88589
published_at 2026-04-01T12:55:00Z
1
value 0.0413
scoring_system epss
scoring_elements 0.88658
published_at 2026-04-16T12:55:00Z
2
value 0.0413
scoring_system epss
scoring_elements 0.88598
published_at 2026-04-02T12:55:00Z
3
value 0.0413
scoring_system epss
scoring_elements 0.88616
published_at 2026-04-04T12:55:00Z
4
value 0.0413
scoring_system epss
scoring_elements 0.88617
published_at 2026-04-07T12:55:00Z
5
value 0.0413
scoring_system epss
scoring_elements 0.88635
published_at 2026-04-08T12:55:00Z
6
value 0.0413
scoring_system epss
scoring_elements 0.8864
published_at 2026-04-09T12:55:00Z
7
value 0.0413
scoring_system epss
scoring_elements 0.88652
published_at 2026-04-11T12:55:00Z
8
value 0.0413
scoring_system epss
scoring_elements 0.88645
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8616
2
reference_url https://curl.se/docs/CVE-2016-8616.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8616.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388371
reference_id 1388371
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388371
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
20
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
21
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
22
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
23
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
24
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
25
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
26
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
27
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
28
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:ebuild/net-misc/curl@7.52.1
purl pkg:ebuild/net-misc/curl@7.52.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1
aliases CVE-2016-8616
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6muy-xpdq-9kg8
2
url VCID-7xxh-66ys-4bhw
vulnerability_id VCID-7xxh-66ys-4bhw
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5419.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5419.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5419
reference_id
reference_type
scores
0
value 0.01968
scoring_system epss
scoring_elements 0.83461
published_at 2026-04-01T12:55:00Z
1
value 0.01968
scoring_system epss
scoring_elements 0.8356
published_at 2026-04-16T12:55:00Z
2
value 0.01968
scoring_system epss
scoring_elements 0.83529
published_at 2026-04-12T12:55:00Z
3
value 0.01968
scoring_system epss
scoring_elements 0.83526
published_at 2026-04-13T12:55:00Z
4
value 0.01968
scoring_system epss
scoring_elements 0.83474
published_at 2026-04-02T12:55:00Z
5
value 0.01968
scoring_system epss
scoring_elements 0.83488
published_at 2026-04-04T12:55:00Z
6
value 0.01968
scoring_system epss
scoring_elements 0.83487
published_at 2026-04-07T12:55:00Z
7
value 0.01968
scoring_system epss
scoring_elements 0.83511
published_at 2026-04-08T12:55:00Z
8
value 0.01968
scoring_system epss
scoring_elements 0.83521
published_at 2026-04-09T12:55:00Z
9
value 0.01968
scoring_system epss
scoring_elements 0.83535
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5419
2
reference_url https://curl.se/docs/CVE-2016-5419.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-5419.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1362183
reference_id 1362183
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1362183
8
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
9
reference_url https://access.redhat.com/errata/RHSA-2016:2575
reference_id RHSA-2016:2575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2575
10
reference_url https://access.redhat.com/errata/RHSA-2016:2957
reference_id RHSA-2016:2957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2957
11
reference_url https://usn.ubuntu.com/3048-1/
reference_id USN-3048-1
reference_type
scores
url https://usn.ubuntu.com/3048-1/
fixed_packages
0
url pkg:ebuild/net-misc/curl@7.52.1
purl pkg:ebuild/net-misc/curl@7.52.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1
aliases CVE-2016-5419
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7xxh-66ys-4bhw
3
url VCID-a3v7-ptf1-6qgd
vulnerability_id VCID-a3v7-ptf1-6qgd
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7141.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7141.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7141
reference_id
reference_type
scores
0
value 0.00524
scoring_system epss
scoring_elements 0.66857
published_at 2026-04-01T12:55:00Z
1
value 0.00524
scoring_system epss
scoring_elements 0.66895
published_at 2026-04-07T12:55:00Z
2
value 0.00524
scoring_system epss
scoring_elements 0.66921
published_at 2026-04-04T12:55:00Z
3
value 0.00524
scoring_system epss
scoring_elements 0.66943
published_at 2026-04-08T12:55:00Z
4
value 0.00524
scoring_system epss
scoring_elements 0.66957
published_at 2026-04-09T12:55:00Z
5
value 0.00524
scoring_system epss
scoring_elements 0.66977
published_at 2026-04-11T12:55:00Z
6
value 0.00524
scoring_system epss
scoring_elements 0.66963
published_at 2026-04-12T12:55:00Z
7
value 0.00524
scoring_system epss
scoring_elements 0.66932
published_at 2026-04-13T12:55:00Z
8
value 0.00524
scoring_system epss
scoring_elements 0.66964
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7141
2
reference_url https://curl.se/docs/CVE-2016-7141.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-7141.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7141
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7141
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1373229
reference_id 1373229
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1373229
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836918
reference_id 836918
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836918
6
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
7
reference_url https://access.redhat.com/errata/RHSA-2016:2575
reference_id RHSA-2016:2575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2575
8
reference_url https://access.redhat.com/errata/RHSA-2016:2957
reference_id RHSA-2016:2957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2957
9
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:ebuild/net-misc/curl@7.52.1
purl pkg:ebuild/net-misc/curl@7.52.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1
aliases CVE-2016-7141
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a3v7-ptf1-6qgd
4
url VCID-b2ef-zj3u-rbhy
vulnerability_id VCID-b2ef-zj3u-rbhy
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url http://curl.haxx.se/docs/adv_20160127A.html
reference_id
reference_type
scores
url http://curl.haxx.se/docs/adv_20160127A.html
1
reference_url http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html
6
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html
7
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html
9
reference_url http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html
reference_id
reference_type
scores
url http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0755.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0755.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0755
reference_id
reference_type
scores
0
value 0.00412
scoring_system epss
scoring_elements 0.61492
published_at 2026-04-16T12:55:00Z
1
value 0.00412
scoring_system epss
scoring_elements 0.61471
published_at 2026-04-12T12:55:00Z
2
value 0.00412
scoring_system epss
scoring_elements 0.61452
published_at 2026-04-13T12:55:00Z
3
value 0.00412
scoring_system epss
scoring_elements 0.61326
published_at 2026-04-01T12:55:00Z
4
value 0.00412
scoring_system epss
scoring_elements 0.61402
published_at 2026-04-02T12:55:00Z
5
value 0.00412
scoring_system epss
scoring_elements 0.61431
published_at 2026-04-04T12:55:00Z
6
value 0.00412
scoring_system epss
scoring_elements 0.61401
published_at 2026-04-07T12:55:00Z
7
value 0.00412
scoring_system epss
scoring_elements 0.61447
published_at 2026-04-08T12:55:00Z
8
value 0.00412
scoring_system epss
scoring_elements 0.61463
published_at 2026-04-09T12:55:00Z
9
value 0.00412
scoring_system epss
scoring_elements 0.61484
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0755
12
reference_url https://curl.se/docs/CVE-2016-0755.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-0755.html
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755
14
reference_url https://support.apple.com/HT207170
reference_id
reference_type
scores
url https://support.apple.com/HT207170
15
reference_url http://www.debian.org/security/2016/dsa-3455
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3455
16
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
17
reference_url http://www.securityfocus.com/bid/82307
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/82307
18
reference_url http://www.securitytracker.com/id/1034882
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034882
19
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965
20
reference_url http://www.ubuntu.com/usn/USN-2882-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2882-1
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1302263
reference_id 1302263
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1302263
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0755
reference_id CVE-2016-0755
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2016-0755
29
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
30
reference_url https://usn.ubuntu.com/2882-1/
reference_id USN-2882-1
reference_type
scores
url https://usn.ubuntu.com/2882-1/
fixed_packages
0
url pkg:ebuild/net-misc/curl@7.52.1
purl pkg:ebuild/net-misc/curl@7.52.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1
aliases CVE-2016-0755
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b2ef-zj3u-rbhy
5
url VCID-bgtv-jrna-9yb3
vulnerability_id VCID-bgtv-jrna-9yb3
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5421.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5421.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5421
reference_id
reference_type
scores
0
value 0.01296
scoring_system epss
scoring_elements 0.79647
published_at 2026-04-01T12:55:00Z
1
value 0.01296
scoring_system epss
scoring_elements 0.79723
published_at 2026-04-16T12:55:00Z
2
value 0.01296
scoring_system epss
scoring_elements 0.79702
published_at 2026-04-12T12:55:00Z
3
value 0.01296
scoring_system epss
scoring_elements 0.79695
published_at 2026-04-13T12:55:00Z
4
value 0.01296
scoring_system epss
scoring_elements 0.79653
published_at 2026-04-02T12:55:00Z
5
value 0.01296
scoring_system epss
scoring_elements 0.79675
published_at 2026-04-04T12:55:00Z
6
value 0.01296
scoring_system epss
scoring_elements 0.79661
published_at 2026-04-07T12:55:00Z
7
value 0.01296
scoring_system epss
scoring_elements 0.7969
published_at 2026-04-08T12:55:00Z
8
value 0.01296
scoring_system epss
scoring_elements 0.79697
published_at 2026-04-09T12:55:00Z
9
value 0.01296
scoring_system epss
scoring_elements 0.79718
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5421
2
reference_url https://curl.se/docs/CVE-2016-5421.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-5421.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1362199
reference_id 1362199
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1362199
8
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
9
reference_url https://usn.ubuntu.com/3048-1/
reference_id USN-3048-1
reference_type
scores
url https://usn.ubuntu.com/3048-1/
fixed_packages
0
url pkg:ebuild/net-misc/curl@7.52.1
purl pkg:ebuild/net-misc/curl@7.52.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1
aliases CVE-2016-5421
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bgtv-jrna-9yb3
6
url VCID-c6dk-7gj6-7far
vulnerability_id VCID-c6dk-7gj6-7far
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8623.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8623.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8623
reference_id
reference_type
scores
0
value 0.00837
scoring_system epss
scoring_elements 0.74621
published_at 2026-04-07T12:55:00Z
1
value 0.00837
scoring_system epss
scoring_elements 0.74617
published_at 2026-04-01T12:55:00Z
2
value 0.00837
scoring_system epss
scoring_elements 0.74647
published_at 2026-04-04T12:55:00Z
3
value 0.00837
scoring_system epss
scoring_elements 0.74653
published_at 2026-04-08T12:55:00Z
4
value 0.00837
scoring_system epss
scoring_elements 0.74667
published_at 2026-04-09T12:55:00Z
5
value 0.00837
scoring_system epss
scoring_elements 0.7469
published_at 2026-04-11T12:55:00Z
6
value 0.00837
scoring_system epss
scoring_elements 0.7467
published_at 2026-04-12T12:55:00Z
7
value 0.00837
scoring_system epss
scoring_elements 0.74662
published_at 2026-04-13T12:55:00Z
8
value 0.00837
scoring_system epss
scoring_elements 0.74699
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8623
2
reference_url https://curl.se/docs/CVE-2016-8623.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8623.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url http://www.securitytracker.com/id/1037192
reference_id 1037192
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/
url http://www.securitytracker.com/id/1037192
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388388
reference_id 1388388
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388388
16
reference_url http://www.securityfocus.com/bid/94106
reference_id 94106
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/
url http://www.securityfocus.com/bid/94106
17
reference_url https://curl.haxx.se/docs/adv_20161102I.html
reference_id adv_20161102I.html
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/
url https://curl.haxx.se/docs/adv_20161102I.html
18
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
19
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
20
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
21
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
22
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
23
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
24
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
25
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
26
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
27
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
28
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
29
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
30
reference_url https://curl.haxx.se/CVE-2016-8623.patch
reference_id CVE-2016-8623.patch
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/
url https://curl.haxx.se/CVE-2016-8623.patch
31
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/
url https://security.gentoo.org/glsa/201701-47
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623
reference_id show_bug.cgi?id=CVE-2016-8623
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623
33
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:ebuild/net-misc/curl@7.52.1
purl pkg:ebuild/net-misc/curl@7.52.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1
aliases CVE-2016-8623
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c6dk-7gj6-7far
7
url VCID-dzzd-afgu-3fcy
vulnerability_id VCID-dzzd-afgu-3fcy
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8150.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8150.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8150
reference_id
reference_type
scores
0
value 0.0123
scoring_system epss
scoring_elements 0.79187
published_at 2026-04-16T12:55:00Z
1
value 0.0123
scoring_system epss
scoring_elements 0.79112
published_at 2026-04-01T12:55:00Z
2
value 0.0123
scoring_system epss
scoring_elements 0.79119
published_at 2026-04-02T12:55:00Z
3
value 0.0123
scoring_system epss
scoring_elements 0.79144
published_at 2026-04-04T12:55:00Z
4
value 0.0123
scoring_system epss
scoring_elements 0.79129
published_at 2026-04-07T12:55:00Z
5
value 0.0123
scoring_system epss
scoring_elements 0.79153
published_at 2026-04-08T12:55:00Z
6
value 0.0123
scoring_system epss
scoring_elements 0.79161
published_at 2026-04-13T12:55:00Z
7
value 0.0123
scoring_system epss
scoring_elements 0.79185
published_at 2026-04-11T12:55:00Z
8
value 0.0123
scoring_system epss
scoring_elements 0.7917
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8150
2
reference_url https://curl.se/docs/CVE-2014-8150.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2014-8150.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1178692
reference_id 1178692
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1178692
5
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
6
reference_url https://access.redhat.com/errata/RHSA-2015:1254
reference_id RHSA-2015:1254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1254
7
reference_url https://access.redhat.com/errata/RHSA-2015:2159
reference_id RHSA-2015:2159
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2159
8
reference_url https://usn.ubuntu.com/2474-1/
reference_id USN-2474-1
reference_type
scores
url https://usn.ubuntu.com/2474-1/
fixed_packages
0
url pkg:ebuild/net-misc/curl@7.52.1
purl pkg:ebuild/net-misc/curl@7.52.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1
aliases CVE-2014-8150
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dzzd-afgu-3fcy
8
url VCID-e58m-g37d-9fd6
vulnerability_id VCID-e58m-g37d-9fd6
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8624.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8624
reference_id
reference_type
scores
0
value 0.01346
scoring_system epss
scoring_elements 0.8003
published_at 2026-04-02T12:55:00Z
1
value 0.01346
scoring_system epss
scoring_elements 0.80052
published_at 2026-04-04T12:55:00Z
2
value 0.01346
scoring_system epss
scoring_elements 0.80042
published_at 2026-04-07T12:55:00Z
3
value 0.01346
scoring_system epss
scoring_elements 0.80069
published_at 2026-04-08T12:55:00Z
4
value 0.01346
scoring_system epss
scoring_elements 0.80098
published_at 2026-04-11T12:55:00Z
5
value 0.01346
scoring_system epss
scoring_elements 0.80078
published_at 2026-04-09T12:55:00Z
6
value 0.01346
scoring_system epss
scoring_elements 0.80023
published_at 2026-04-01T12:55:00Z
7
value 0.01346
scoring_system epss
scoring_elements 0.80102
published_at 2026-04-16T12:55:00Z
8
value 0.01346
scoring_system epss
scoring_elements 0.80073
published_at 2026-04-13T12:55:00Z
9
value 0.01346
scoring_system epss
scoring_elements 0.80082
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8624
2
reference_url https://curl.se/docs/CVE-2016-8624.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8624.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url http://www.securitytracker.com/id/1037192
reference_id 1037192
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/
url http://www.securitytracker.com/id/1037192
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388390
reference_id 1388390
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388390
16
reference_url http://www.securityfocus.com/bid/94103
reference_id 94103
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/
url http://www.securityfocus.com/bid/94103
17
reference_url https://curl.haxx.se/docs/adv_20161102J.html
reference_id adv_20161102J.html
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/
url https://curl.haxx.se/docs/adv_20161102J.html
18
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
19
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
20
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
21
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
22
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
23
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
24
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
25
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
26
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
27
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
28
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
29
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
30
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/
url https://security.gentoo.org/glsa/201701-47
31
reference_url https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5%40%3Ccommits.pulsar.apache.org%3E
reference_id rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5%40%3Ccommits.pulsar.apache.org%3E
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/
url https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5%40%3Ccommits.pulsar.apache.org%3E
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624
reference_id show_bug.cgi?id=CVE-2016-8624
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624
33
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:ebuild/net-misc/curl@7.52.1
purl pkg:ebuild/net-misc/curl@7.52.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1
aliases CVE-2016-8624
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e58m-g37d-9fd6
9
url VCID-eap9-v2gp-fqgh
vulnerability_id VCID-eap9-v2gp-fqgh
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3739.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3739.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3739
reference_id
reference_type
scores
0
value 0.01068
scoring_system epss
scoring_elements 0.77748
published_at 2026-04-16T12:55:00Z
1
value 0.01068
scoring_system epss
scoring_elements 0.77712
published_at 2026-04-12T12:55:00Z
2
value 0.01068
scoring_system epss
scoring_elements 0.77711
published_at 2026-04-13T12:55:00Z
3
value 0.01068
scoring_system epss
scoring_elements 0.77652
published_at 2026-04-01T12:55:00Z
4
value 0.01068
scoring_system epss
scoring_elements 0.77659
published_at 2026-04-02T12:55:00Z
5
value 0.01068
scoring_system epss
scoring_elements 0.77686
published_at 2026-04-04T12:55:00Z
6
value 0.01068
scoring_system epss
scoring_elements 0.77669
published_at 2026-04-07T12:55:00Z
7
value 0.01068
scoring_system epss
scoring_elements 0.77696
published_at 2026-04-08T12:55:00Z
8
value 0.01068
scoring_system epss
scoring_elements 0.77702
published_at 2026-04-09T12:55:00Z
9
value 0.01068
scoring_system epss
scoring_elements 0.77728
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3739
2
reference_url https://curl.haxx.se/changes.html#7_49_0
reference_id
reference_type
scores
url https://curl.haxx.se/changes.html#7_49_0
3
reference_url https://curl.haxx.se/CVE-2016-3739.patch
reference_id
reference_type
scores
url https://curl.haxx.se/CVE-2016-3739.patch
4
reference_url https://curl.haxx.se/docs/adv_20160518.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_20160518.html
5
reference_url https://curl.se/docs/CVE-2016-3739.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-3739.html
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3739
7
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149
8
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
9
reference_url http://www.openwall.com/lists/oss-security/2024/03/27/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2024/03/27/4
10
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
11
reference_url http://www.securityfocus.com/bid/90726
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/90726
12
reference_url http://www.securitytracker.com/id/1035907
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035907
13
reference_url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.495349
reference_id
reference_type
scores
url http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.495349
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1335430
reference_id 1335430
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1335430
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3739
reference_id CVE-2016-3739
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:N
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2016-3739
53
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
fixed_packages
0
url pkg:ebuild/net-misc/curl@7.52.1
purl pkg:ebuild/net-misc/curl@7.52.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1
aliases CVE-2016-3739
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eap9-v2gp-fqgh
10
url VCID-fnj3-2du1-4bhx
vulnerability_id VCID-fnj3-2du1-4bhx
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/
url https://access.redhat.com/errata/RHSA-2018:3558
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9586.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9586.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9586
reference_id
reference_type
scores
0
value 0.00891
scoring_system epss
scoring_elements 0.75494
published_at 2026-04-02T12:55:00Z
1
value 0.00891
scoring_system epss
scoring_elements 0.75492
published_at 2026-04-01T12:55:00Z
2
value 0.00891
scoring_system epss
scoring_elements 0.75557
published_at 2026-04-12T12:55:00Z
3
value 0.00891
scoring_system epss
scoring_elements 0.75548
published_at 2026-04-13T12:55:00Z
4
value 0.00891
scoring_system epss
scoring_elements 0.75506
published_at 2026-04-07T12:55:00Z
5
value 0.00891
scoring_system epss
scoring_elements 0.75525
published_at 2026-04-04T12:55:00Z
6
value 0.00891
scoring_system epss
scoring_elements 0.7559
published_at 2026-04-16T12:55:00Z
7
value 0.00891
scoring_system epss
scoring_elements 0.75578
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9586
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586
4
reference_url https://curl.haxx.se/docs/adv_20161221A.html
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/
url https://curl.haxx.se/docs/adv_20161221A.html
5
reference_url https://curl.se/docs/CVE-2016-9586.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-9586.html
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/
url https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16
9
reference_url https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/
url https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/
url https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
11
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/
url https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html
12
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
13
reference_url http://www.securityfocus.com/bid/95019
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/
url http://www.securityfocus.com/bid/95019
14
reference_url http://www.securitytracker.com/id/1037515
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/
url http://www.securitytracker.com/id/1037515
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1406712
reference_id 1406712
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1406712
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848958
reference_id 848958
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848958
17
reference_url https://security.archlinux.org/ASA-201612-22
reference_id ASA-201612-22
reference_type
scores
url https://security.archlinux.org/ASA-201612-22
18
reference_url https://security.archlinux.org/ASA-201701-10
reference_id ASA-201701-10
reference_type
scores
url https://security.archlinux.org/ASA-201701-10
19
reference_url https://security.archlinux.org/ASA-201701-11
reference_id ASA-201701-11
reference_type
scores
url https://security.archlinux.org/ASA-201701-11
20
reference_url https://security.archlinux.org/ASA-201701-7
reference_id ASA-201701-7
reference_type
scores
url https://security.archlinux.org/ASA-201701-7
21
reference_url https://security.archlinux.org/ASA-201701-8
reference_id ASA-201701-8
reference_type
scores
url https://security.archlinux.org/ASA-201701-8
22
reference_url https://security.archlinux.org/ASA-201701-9
reference_id ASA-201701-9
reference_type
scores
url https://security.archlinux.org/ASA-201701-9
23
reference_url https://security.archlinux.org/AVG-112
reference_id AVG-112
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-112
24
reference_url https://security.archlinux.org/AVG-113
reference_id AVG-113
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-113
25
reference_url https://security.archlinux.org/AVG-114
reference_id AVG-114
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-114
26
reference_url https://security.archlinux.org/AVG-115
reference_id AVG-115
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-115
27
reference_url https://security.archlinux.org/AVG-116
reference_id AVG-116
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-116
28
reference_url https://security.archlinux.org/AVG-117
reference_id AVG-117
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-117
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-9586
reference_id CVE-2016-9586
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-9586
31
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/
url https://security.gentoo.org/glsa/201701-47
32
reference_url https://usn.ubuntu.com/3441-1/
reference_id USN-3441-1
reference_type
scores
url https://usn.ubuntu.com/3441-1/
33
reference_url https://usn.ubuntu.com/3441-2/
reference_id USN-3441-2
reference_type
scores
url https://usn.ubuntu.com/3441-2/
fixed_packages
0
url pkg:ebuild/net-misc/curl@7.52.1
purl pkg:ebuild/net-misc/curl@7.52.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1
aliases CVE-2016-9586
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fnj3-2du1-4bhx
11
url VCID-hyqp-z8hb-fqbt
vulnerability_id VCID-hyqp-z8hb-fqbt
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9594.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9594.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9594
reference_id
reference_type
scores
0
value 0.01088
scoring_system epss
scoring_elements 0.77857
published_at 2026-04-01T12:55:00Z
1
value 0.01088
scoring_system epss
scoring_elements 0.77906
published_at 2026-04-09T12:55:00Z
2
value 0.01088
scoring_system epss
scoring_elements 0.77864
published_at 2026-04-02T12:55:00Z
3
value 0.01088
scoring_system epss
scoring_elements 0.77892
published_at 2026-04-04T12:55:00Z
4
value 0.01088
scoring_system epss
scoring_elements 0.77874
published_at 2026-04-07T12:55:00Z
5
value 0.01088
scoring_system epss
scoring_elements 0.77901
published_at 2026-04-08T12:55:00Z
6
value 0.01088
scoring_system epss
scoring_elements 0.77933
published_at 2026-04-11T12:55:00Z
7
value 0.01088
scoring_system epss
scoring_elements 0.77917
published_at 2026-04-12T12:55:00Z
8
value 0.01088
scoring_system epss
scoring_elements 0.77916
published_at 2026-04-13T12:55:00Z
9
value 0.01088
scoring_system epss
scoring_elements 0.77954
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9594
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9594
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:12Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9594
3
reference_url https://curl.haxx.se/docs/adv_20161223.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:12Z/
url https://curl.haxx.se/docs/adv_20161223.html
4
reference_url https://curl.se/docs/CVE-2016-9594.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-9594.html
5
reference_url https://www.tenable.com/security/tns-2017-04
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:12Z/
url https://www.tenable.com/security/tns-2017-04
6
reference_url http://www.securityfocus.com/bid/95094
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:12Z/
url http://www.securityfocus.com/bid/95094
7
reference_url http://www.securitytracker.com/id/1037528
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:12Z/
url http://www.securitytracker.com/id/1037528
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1408385
reference_id 1408385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1408385
9
reference_url https://security.archlinux.org/ASA-201612-22
reference_id ASA-201612-22
reference_type
scores
url https://security.archlinux.org/ASA-201612-22
10
reference_url https://security.archlinux.org/ASA-201701-10
reference_id ASA-201701-10
reference_type
scores
url https://security.archlinux.org/ASA-201701-10
11
reference_url https://security.archlinux.org/ASA-201701-11
reference_id ASA-201701-11
reference_type
scores
url https://security.archlinux.org/ASA-201701-11
12
reference_url https://security.archlinux.org/ASA-201701-7
reference_id ASA-201701-7
reference_type
scores
url https://security.archlinux.org/ASA-201701-7
13
reference_url https://security.archlinux.org/ASA-201701-8
reference_id ASA-201701-8
reference_type
scores
url https://security.archlinux.org/ASA-201701-8
14
reference_url https://security.archlinux.org/ASA-201701-9
reference_id ASA-201701-9
reference_type
scores
url https://security.archlinux.org/ASA-201701-9
15
reference_url https://security.archlinux.org/AVG-112
reference_id AVG-112
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-112
16
reference_url https://security.archlinux.org/AVG-113
reference_id AVG-113
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-113
17
reference_url https://security.archlinux.org/AVG-114
reference_id AVG-114
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-114
18
reference_url https://security.archlinux.org/AVG-115
reference_id AVG-115
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-115
19
reference_url https://security.archlinux.org/AVG-116
reference_id AVG-116
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-116
20
reference_url https://security.archlinux.org/AVG-117
reference_id AVG-117
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-117
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-9594
reference_id CVE-2016-9594
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
2
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-9594
23
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:12Z/
url https://security.gentoo.org/glsa/201701-47
fixed_packages
0
url pkg:ebuild/net-misc/curl@7.52.1
purl pkg:ebuild/net-misc/curl@7.52.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1
aliases CVE-2016-9594
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hyqp-z8hb-fqbt
12
url VCID-j2cq-q3r9-jfcp
vulnerability_id VCID-j2cq-q3r9-jfcp
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8620.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8620.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8620
reference_id
reference_type
scores
0
value 0.00816
scoring_system epss
scoring_elements 0.74284
published_at 2026-04-04T12:55:00Z
1
value 0.00816
scoring_system epss
scoring_elements 0.7429
published_at 2026-04-08T12:55:00Z
2
value 0.00816
scoring_system epss
scoring_elements 0.74305
published_at 2026-04-09T12:55:00Z
3
value 0.00816
scoring_system epss
scoring_elements 0.74326
published_at 2026-04-11T12:55:00Z
4
value 0.00816
scoring_system epss
scoring_elements 0.74306
published_at 2026-04-12T12:55:00Z
5
value 0.00816
scoring_system epss
scoring_elements 0.74335
published_at 2026-04-16T12:55:00Z
6
value 0.00816
scoring_system epss
scoring_elements 0.74298
published_at 2026-04-13T12:55:00Z
7
value 0.00816
scoring_system epss
scoring_elements 0.74253
published_at 2026-04-01T12:55:00Z
8
value 0.00816
scoring_system epss
scoring_elements 0.74258
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8620
2
reference_url https://curl.se/docs/CVE-2016-8620.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8620.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url http://www.securitytracker.com/id/1037192
reference_id 1037192
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:04:13Z/
url http://www.securitytracker.com/id/1037192
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388382
reference_id 1388382
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388382
16
reference_url http://www.securityfocus.com/bid/94102
reference_id 94102
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:04:13Z/
url http://www.securityfocus.com/bid/94102
17
reference_url https://curl.haxx.se/docs/adv_20161102F.html
reference_id adv_20161102F.html
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:04:13Z/
url https://curl.haxx.se/docs/adv_20161102F.html
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
20
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:04:13Z/
url https://security.gentoo.org/glsa/201701-47
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8620
reference_id show_bug.cgi?id=CVE-2016-8620
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:04:13Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8620
22
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:ebuild/net-misc/curl@7.52.1
purl pkg:ebuild/net-misc/curl@7.52.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1
aliases CVE-2016-8620
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j2cq-q3r9-jfcp
13
url VCID-jeqg-g3en-5udw
vulnerability_id VCID-jeqg-g3en-5udw
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5420.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5420.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5420
reference_id
reference_type
scores
0
value 0.01086
scoring_system epss
scoring_elements 0.77847
published_at 2026-04-01T12:55:00Z
1
value 0.01086
scoring_system epss
scoring_elements 0.77944
published_at 2026-04-16T12:55:00Z
2
value 0.01086
scoring_system epss
scoring_elements 0.77907
published_at 2026-04-12T12:55:00Z
3
value 0.01086
scoring_system epss
scoring_elements 0.77906
published_at 2026-04-13T12:55:00Z
4
value 0.01086
scoring_system epss
scoring_elements 0.77854
published_at 2026-04-02T12:55:00Z
5
value 0.01086
scoring_system epss
scoring_elements 0.77882
published_at 2026-04-04T12:55:00Z
6
value 0.01086
scoring_system epss
scoring_elements 0.77864
published_at 2026-04-07T12:55:00Z
7
value 0.01086
scoring_system epss
scoring_elements 0.77891
published_at 2026-04-08T12:55:00Z
8
value 0.01086
scoring_system epss
scoring_elements 0.77896
published_at 2026-04-09T12:55:00Z
9
value 0.01086
scoring_system epss
scoring_elements 0.77923
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5420
2
reference_url https://curl.se/docs/CVE-2016-5420.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-5420.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1362190
reference_id 1362190
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1362190
8
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
9
reference_url https://access.redhat.com/errata/RHSA-2016:2575
reference_id RHSA-2016:2575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2575
10
reference_url https://access.redhat.com/errata/RHSA-2016:2957
reference_id RHSA-2016:2957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2957
11
reference_url https://usn.ubuntu.com/3048-1/
reference_id USN-3048-1
reference_type
scores
url https://usn.ubuntu.com/3048-1/
fixed_packages
0
url pkg:ebuild/net-misc/curl@7.52.1
purl pkg:ebuild/net-misc/curl@7.52.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1
aliases CVE-2016-5420
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jeqg-g3en-5udw
14
url VCID-jqqf-gmd3-ubcd
vulnerability_id VCID-jqqf-gmd3-ubcd
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8621.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8621.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8621
reference_id
reference_type
scores
0
value 0.0226
scoring_system epss
scoring_elements 0.84617
published_at 2026-04-13T12:55:00Z
1
value 0.0226
scoring_system epss
scoring_elements 0.84539
published_at 2026-04-01T12:55:00Z
2
value 0.0226
scoring_system epss
scoring_elements 0.84608
published_at 2026-04-09T12:55:00Z
3
value 0.0226
scoring_system epss
scoring_elements 0.84627
published_at 2026-04-11T12:55:00Z
4
value 0.0226
scoring_system epss
scoring_elements 0.84622
published_at 2026-04-12T12:55:00Z
5
value 0.0226
scoring_system epss
scoring_elements 0.84638
published_at 2026-04-16T12:55:00Z
6
value 0.0226
scoring_system epss
scoring_elements 0.84555
published_at 2026-04-02T12:55:00Z
7
value 0.0226
scoring_system epss
scoring_elements 0.84576
published_at 2026-04-04T12:55:00Z
8
value 0.0226
scoring_system epss
scoring_elements 0.8458
published_at 2026-04-07T12:55:00Z
9
value 0.0226
scoring_system epss
scoring_elements 0.84601
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8621
2
reference_url https://curl.se/docs/CVE-2016-8621.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8621.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url http://www.securitytracker.com/id/1037192
reference_id 1037192
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/
url http://www.securitytracker.com/id/1037192
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388385
reference_id 1388385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388385
16
reference_url http://www.securityfocus.com/bid/94101
reference_id 94101
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/
url http://www.securityfocus.com/bid/94101
17
reference_url https://curl.haxx.se/docs/adv_20161102G.html
reference_id adv_20161102G.html
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/
url https://curl.haxx.se/docs/adv_20161102G.html
18
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
19
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
20
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
21
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
22
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
23
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
24
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
25
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
26
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
27
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
28
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
29
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
30
reference_url https://curl.haxx.se/CVE-2016-8621.patch
reference_id CVE-2016-8621.patch
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/
url https://curl.haxx.se/CVE-2016-8621.patch
31
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/
url https://security.gentoo.org/glsa/201701-47
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621
reference_id show_bug.cgi?id=CVE-2016-8621
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621
33
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:ebuild/net-misc/curl@7.52.1
purl pkg:ebuild/net-misc/curl@7.52.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1
aliases CVE-2016-8621
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jqqf-gmd3-ubcd
15
url VCID-jtw4-af4y-nkbk
vulnerability_id VCID-jtw4-af4y-nkbk
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8619.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8619.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8619
reference_id
reference_type
scores
0
value 0.02935
scoring_system epss
scoring_elements 0.86359
published_at 2026-04-01T12:55:00Z
1
value 0.02935
scoring_system epss
scoring_elements 0.86441
published_at 2026-04-16T12:55:00Z
2
value 0.02935
scoring_system epss
scoring_elements 0.8637
published_at 2026-04-02T12:55:00Z
3
value 0.02935
scoring_system epss
scoring_elements 0.86387
published_at 2026-04-04T12:55:00Z
4
value 0.02935
scoring_system epss
scoring_elements 0.86389
published_at 2026-04-07T12:55:00Z
5
value 0.02935
scoring_system epss
scoring_elements 0.86408
published_at 2026-04-08T12:55:00Z
6
value 0.02935
scoring_system epss
scoring_elements 0.86418
published_at 2026-04-09T12:55:00Z
7
value 0.02935
scoring_system epss
scoring_elements 0.86432
published_at 2026-04-11T12:55:00Z
8
value 0.02935
scoring_system epss
scoring_elements 0.8643
published_at 2026-04-12T12:55:00Z
9
value 0.02935
scoring_system epss
scoring_elements 0.86425
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8619
2
reference_url https://curl.se/docs/CVE-2016-8619.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8619.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388379
reference_id 1388379
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388379
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
20
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
21
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
22
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
23
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
24
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
25
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
26
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
27
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
28
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:ebuild/net-misc/curl@7.52.1
purl pkg:ebuild/net-misc/curl@7.52.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1
aliases CVE-2016-8619
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jtw4-af4y-nkbk
16
url VCID-k8kj-q1je-f7bt
vulnerability_id VCID-k8kj-q1je-f7bt
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7167.json
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7167.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7167
reference_id
reference_type
scores
0
value 0.02289
scoring_system epss
scoring_elements 0.84631
published_at 2026-04-01T12:55:00Z
1
value 0.02289
scoring_system epss
scoring_elements 0.84726
published_at 2026-04-16T12:55:00Z
2
value 0.02289
scoring_system epss
scoring_elements 0.84696
published_at 2026-04-09T12:55:00Z
3
value 0.02289
scoring_system epss
scoring_elements 0.84715
published_at 2026-04-11T12:55:00Z
4
value 0.02289
scoring_system epss
scoring_elements 0.8471
published_at 2026-04-12T12:55:00Z
5
value 0.02289
scoring_system epss
scoring_elements 0.84704
published_at 2026-04-13T12:55:00Z
6
value 0.02289
scoring_system epss
scoring_elements 0.84646
published_at 2026-04-02T12:55:00Z
7
value 0.02289
scoring_system epss
scoring_elements 0.84666
published_at 2026-04-04T12:55:00Z
8
value 0.02289
scoring_system epss
scoring_elements 0.84667
published_at 2026-04-07T12:55:00Z
9
value 0.02289
scoring_system epss
scoring_elements 0.84689
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7167
2
reference_url https://curl.se/docs/CVE-2016-7167.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-7167.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1375906
reference_id 1375906
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1375906
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837945
reference_id 837945
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837945
7
reference_url https://security.archlinux.org/ASA-201609-18
reference_id ASA-201609-18
reference_type
scores
url https://security.archlinux.org/ASA-201609-18
8
reference_url https://security.archlinux.org/ASA-201609-19
reference_id ASA-201609-19
reference_type
scores
url https://security.archlinux.org/ASA-201609-19
9
reference_url https://security.archlinux.org/AVG-20
reference_id AVG-20
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-20
10
reference_url https://security.archlinux.org/AVG-21
reference_id AVG-21
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-21
11
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
12
reference_url https://access.redhat.com/errata/RHSA-2017:2016
reference_id RHSA-2017:2016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2016
13
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:ebuild/net-misc/curl@7.52.1
purl pkg:ebuild/net-misc/curl@7.52.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1
aliases CVE-2016-7167
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k8kj-q1je-f7bt
17
url VCID-t753-w1ha-kqaz
vulnerability_id VCID-t753-w1ha-kqaz
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8151.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8151.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8151
reference_id
reference_type
scores
0
value 0.00424
scoring_system epss
scoring_elements 0.62234
published_at 2026-04-16T12:55:00Z
1
value 0.00424
scoring_system epss
scoring_elements 0.62074
published_at 2026-04-01T12:55:00Z
2
value 0.00424
scoring_system epss
scoring_elements 0.62134
published_at 2026-04-07T12:55:00Z
3
value 0.00424
scoring_system epss
scoring_elements 0.62166
published_at 2026-04-04T12:55:00Z
4
value 0.00424
scoring_system epss
scoring_elements 0.62184
published_at 2026-04-08T12:55:00Z
5
value 0.00424
scoring_system epss
scoring_elements 0.62202
published_at 2026-04-09T12:55:00Z
6
value 0.00424
scoring_system epss
scoring_elements 0.6222
published_at 2026-04-11T12:55:00Z
7
value 0.00424
scoring_system epss
scoring_elements 0.6221
published_at 2026-04-12T12:55:00Z
8
value 0.00424
scoring_system epss
scoring_elements 0.62189
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8151
2
reference_url https://curl.se/docs/CVE-2014-8151.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2014-8151.html
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1178698
reference_id 1178698
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1178698
4
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
fixed_packages
0
url pkg:ebuild/net-misc/curl@7.52.1
purl pkg:ebuild/net-misc/curl@7.52.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1
aliases CVE-2014-8151
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t753-w1ha-kqaz
18
url VCID-vxpj-xygq-9be2
vulnerability_id VCID-vxpj-xygq-9be2
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8615.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8615.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8615
reference_id
reference_type
scores
0
value 0.02337
scoring_system epss
scoring_elements 0.84774
published_at 2026-04-01T12:55:00Z
1
value 0.02337
scoring_system epss
scoring_elements 0.84808
published_at 2026-04-04T12:55:00Z
2
value 0.02337
scoring_system epss
scoring_elements 0.8481
published_at 2026-04-07T12:55:00Z
3
value 0.02337
scoring_system epss
scoring_elements 0.84832
published_at 2026-04-08T12:55:00Z
4
value 0.02337
scoring_system epss
scoring_elements 0.84839
published_at 2026-04-09T12:55:00Z
5
value 0.02337
scoring_system epss
scoring_elements 0.84857
published_at 2026-04-11T12:55:00Z
6
value 0.02337
scoring_system epss
scoring_elements 0.84854
published_at 2026-04-12T12:55:00Z
7
value 0.02337
scoring_system epss
scoring_elements 0.84849
published_at 2026-04-13T12:55:00Z
8
value 0.02337
scoring_system epss
scoring_elements 0.8487
published_at 2026-04-16T12:55:00Z
9
value 0.02337
scoring_system epss
scoring_elements 0.84789
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8615
2
reference_url https://curl.se/docs/CVE-2016-8615.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8615.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url http://www.securitytracker.com/id/1037192
reference_id 1037192
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/
url http://www.securitytracker.com/id/1037192
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388370
reference_id 1388370
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388370
16
reference_url http://www.securityfocus.com/bid/94096
reference_id 94096
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/
url http://www.securityfocus.com/bid/94096
17
reference_url https://curl.haxx.se/docs/adv_20161102A.html
reference_id adv_20161102A.html
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/
url https://curl.haxx.se/docs/adv_20161102A.html
18
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
19
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
20
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
21
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
22
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
23
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
24
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
25
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
26
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
27
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
28
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
29
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
30
reference_url https://curl.haxx.se/CVE-2016-8615.patch
reference_id CVE-2016-8615.patch
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/
url https://curl.haxx.se/CVE-2016-8615.patch
31
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/
url https://security.gentoo.org/glsa/201701-47
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615
reference_id show_bug.cgi?id=CVE-2016-8615
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615
33
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:ebuild/net-misc/curl@7.52.1
purl pkg:ebuild/net-misc/curl@7.52.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1
aliases CVE-2016-8615
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vxpj-xygq-9be2
19
url VCID-vyk2-s5ut-ubbz
vulnerability_id VCID-vyk2-s5ut-ubbz
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8618.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8618.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8618
reference_id
reference_type
scores
0
value 0.01654
scoring_system epss
scoring_elements 0.81967
published_at 2026-04-01T12:55:00Z
1
value 0.01654
scoring_system epss
scoring_elements 0.82068
published_at 2026-04-16T12:55:00Z
2
value 0.01654
scoring_system epss
scoring_elements 0.81997
published_at 2026-04-07T12:55:00Z
3
value 0.01654
scoring_system epss
scoring_elements 0.82024
published_at 2026-04-08T12:55:00Z
4
value 0.01654
scoring_system epss
scoring_elements 0.82031
published_at 2026-04-09T12:55:00Z
5
value 0.01654
scoring_system epss
scoring_elements 0.82051
published_at 2026-04-11T12:55:00Z
6
value 0.01654
scoring_system epss
scoring_elements 0.8204
published_at 2026-04-12T12:55:00Z
7
value 0.01654
scoring_system epss
scoring_elements 0.82033
published_at 2026-04-13T12:55:00Z
8
value 0.01654
scoring_system epss
scoring_elements 0.81978
published_at 2026-04-02T12:55:00Z
9
value 0.01654
scoring_system epss
scoring_elements 0.82001
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8618
2
reference_url https://curl.se/docs/CVE-2016-8618.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8618.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388378
reference_id 1388378
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388378
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
19
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
20
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
21
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
22
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:ebuild/net-misc/curl@7.52.1
purl pkg:ebuild/net-misc/curl@7.52.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1
aliases CVE-2016-8618
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vyk2-s5ut-ubbz
20
url VCID-yxks-8529-23bj
vulnerability_id VCID-yxks-8529-23bj
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8625.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8625.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8625
reference_id
reference_type
scores
0
value 0.01526
scoring_system epss
scoring_elements 0.81219
published_at 2026-04-01T12:55:00Z
1
value 0.01526
scoring_system epss
scoring_elements 0.8132
published_at 2026-04-16T12:55:00Z
2
value 0.01526
scoring_system epss
scoring_elements 0.81228
published_at 2026-04-02T12:55:00Z
3
value 0.01526
scoring_system epss
scoring_elements 0.81251
published_at 2026-04-04T12:55:00Z
4
value 0.01526
scoring_system epss
scoring_elements 0.8125
published_at 2026-04-07T12:55:00Z
5
value 0.01526
scoring_system epss
scoring_elements 0.81278
published_at 2026-04-08T12:55:00Z
6
value 0.01526
scoring_system epss
scoring_elements 0.81283
published_at 2026-04-13T12:55:00Z
7
value 0.01526
scoring_system epss
scoring_elements 0.81304
published_at 2026-04-11T12:55:00Z
8
value 0.01526
scoring_system epss
scoring_elements 0.8129
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8625
2
reference_url https://curl.se/docs/CVE-2016-8625.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8625.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388392
reference_id 1388392
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388392
6
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
7
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
8
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
9
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
10
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
11
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
12
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
13
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
14
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
15
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
16
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
17
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
18
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
fixed_packages
0
url pkg:ebuild/net-misc/curl@7.52.1
purl pkg:ebuild/net-misc/curl@7.52.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1
aliases CVE-2016-8625
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yxks-8529-23bj
21
url VCID-zxz2-xfpd-pbay
vulnerability_id VCID-zxz2-xfpd-pbay
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8617.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8617.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8617
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19714
published_at 2026-04-02T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19573
published_at 2026-04-01T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19763
published_at 2026-04-04T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19488
published_at 2026-04-07T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19567
published_at 2026-04-08T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19619
published_at 2026-04-09T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19623
published_at 2026-04-11T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19575
published_at 2026-04-12T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19517
published_at 2026-04-13T12:55:00Z
9
value 0.00063
scoring_system epss
scoring_elements 0.19482
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8617
2
reference_url https://curl.se/docs/CVE-2016-8617.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8617.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url http://www.securitytracker.com/id/1037192
reference_id 1037192
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/
url http://www.securitytracker.com/id/1037192
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388377
reference_id 1388377
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388377
16
reference_url http://www.securityfocus.com/bid/94097
reference_id 94097
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/
url http://www.securityfocus.com/bid/94097
17
reference_url https://curl.haxx.se/docs/adv_20161102C.html
reference_id adv_20161102C.html
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/
url https://curl.haxx.se/docs/adv_20161102C.html
18
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
19
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
20
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
21
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
22
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
23
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
24
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
25
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
26
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
27
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
28
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
29
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
30
reference_url https://curl.haxx.se/CVE-2016-8617.patch
reference_id CVE-2016-8617.patch
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/
url https://curl.haxx.se/CVE-2016-8617.patch
31
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/
url https://security.gentoo.org/glsa/201701-47
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617
reference_id show_bug.cgi?id=CVE-2016-8617
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617
33
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
0
url pkg:ebuild/net-misc/curl@7.52.1
purl pkg:ebuild/net-misc/curl@7.52.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1
aliases CVE-2016-8617
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zxz2-xfpd-pbay
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1