Lookup for vulnerable packages by Package URL.

GET /api/packages/73828?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/73828?format=api",
    "purl": "pkg:ebuild/net-misc/curl@7.52.1",
    "type": "ebuild",
    "namespace": "net-misc",
    "name": "curl",
    "version": "7.52.1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "7.53.0",
    "latest_non_vulnerable_version": "8.7.1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34703?format=api",
            "vulnerability_id": "VCID-5jan-pqf6-fyhr",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8622.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8622.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81845",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81915",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81911",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81947",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81856",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81879",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81875",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81901",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81908",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81927",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8622"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8622.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8622.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037192",
                    "reference_id": "1037192",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:54:47Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037192"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388386",
                    "reference_id": "1388386",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388386"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/94105",
                    "reference_id": "94105",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:54:47Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/94105"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20161102H.html",
                    "reference_id": "adv_20161102H.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:54:47Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_20161102H.html"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:54:47Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622",
                    "reference_id": "show_bug.cgi?id=CVE-2016-8622",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:54:47Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73828?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.52.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1"
                }
            ],
            "aliases": [
                "CVE-2016-8622"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5jan-pqf6-fyhr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34697?format=api",
            "vulnerability_id": "VCID-6muy-xpdq-9kg8",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8616.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8616.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88589",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88658",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88598",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88616",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88617",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88635",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8864",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88652",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88645",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8616"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8616.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8616.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388371",
                    "reference_id": "1388371",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388371"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73828?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.52.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1"
                }
            ],
            "aliases": [
                "CVE-2016-8616"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6muy-xpdq-9kg8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34691?format=api",
            "vulnerability_id": "VCID-7xxh-66ys-4bhw",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5419.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5419.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5419",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83461",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8356",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83529",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83526",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83474",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83488",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83487",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83511",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83521",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01968",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83535",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5419"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-5419.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-5419.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362183",
                    "reference_id": "1362183",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362183"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2575",
                    "reference_id": "RHSA-2016:2575",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2575"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2957",
                    "reference_id": "RHSA-2016:2957",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2957"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3048-1/",
                    "reference_id": "USN-3048-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3048-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73828?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.52.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1"
                }
            ],
            "aliases": [
                "CVE-2016-5419"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7xxh-66ys-4bhw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34694?format=api",
            "vulnerability_id": "VCID-a3v7-ptf1-6qgd",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7141.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7141.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66857",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66895",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66921",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66943",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66957",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66977",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66963",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66932",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00524",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66964",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7141"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-7141.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-7141.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7141"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373229",
                    "reference_id": "1373229",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1373229"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836918",
                    "reference_id": "836918",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836918"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2575",
                    "reference_id": "RHSA-2016:2575",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2575"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2957",
                    "reference_id": "RHSA-2016:2957",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2957"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73828?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.52.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1"
                }
            ],
            "aliases": [
                "CVE-2016-7141"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a3v7-ptf1-6qgd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34689?format=api",
            "vulnerability_id": "VCID-b2ef-zj3u-rbhy",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "http://curl.haxx.se/docs/adv_20160127A.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://curl.haxx.se/docs/adv_20160127A.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0755.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0755.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0755",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61492",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61471",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61452",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61326",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61402",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61431",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61401",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61447",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61463",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00412",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61484",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0755"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-0755.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-0755.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755"
                },
                {
                    "reference_url": "https://support.apple.com/HT207170",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT207170"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3455",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3455"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/82307",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/82307"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034882"
                },
                {
                    "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2882-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2882-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302263",
                    "reference_id": "1302263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302263"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0755",
                    "reference_id": "CVE-2016-0755",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0755"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2882-1/",
                    "reference_id": "USN-2882-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2882-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73828?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.52.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1"
                }
            ],
            "aliases": [
                "CVE-2016-0755"
            ],
            "risk_score": 3.3,
            "exploitability": "0.5",
            "weighted_severity": "6.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b2ef-zj3u-rbhy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34693?format=api",
            "vulnerability_id": "VCID-bgtv-jrna-9yb3",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5421.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5421.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5421",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79647",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79723",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79702",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79695",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79653",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79675",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79661",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7969",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79697",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79718",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5421"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-5421.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-5421.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362199",
                    "reference_id": "1362199",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362199"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3048-1/",
                    "reference_id": "USN-3048-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3048-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73828?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.52.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1"
                }
            ],
            "aliases": [
                "CVE-2016-5421"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bgtv-jrna-9yb3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34704?format=api",
            "vulnerability_id": "VCID-c6dk-7gj6-7far",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8623.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8623.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74621",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74617",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74647",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74653",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74667",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7469",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7467",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74662",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00837",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74699",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8623"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8623.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8623.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037192",
                    "reference_id": "1037192",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037192"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388388",
                    "reference_id": "1388388",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388388"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/94106",
                    "reference_id": "94106",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/94106"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20161102I.html",
                    "reference_id": "adv_20161102I.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_20161102I.html"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://curl.haxx.se/CVE-2016-8623.patch",
                    "reference_id": "CVE-2016-8623.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/CVE-2016-8623.patch"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623",
                    "reference_id": "show_bug.cgi?id=CVE-2016-8623",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73828?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.52.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1"
                }
            ],
            "aliases": [
                "CVE-2016-8623"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c6dk-7gj6-7far"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34687?format=api",
            "vulnerability_id": "VCID-dzzd-afgu-3fcy",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8150.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8150.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8150",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79187",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79112",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79119",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79144",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79129",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79153",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79161",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79185",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0123",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7917",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8150"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2014-8150.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2014-8150.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178692",
                    "reference_id": "1178692",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178692"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1254",
                    "reference_id": "RHSA-2015:1254",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1254"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2159",
                    "reference_id": "RHSA-2015:2159",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2159"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2474-1/",
                    "reference_id": "USN-2474-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2474-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73828?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.52.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1"
                }
            ],
            "aliases": [
                "CVE-2014-8150"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dzzd-afgu-3fcy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34705?format=api",
            "vulnerability_id": "VCID-e58m-g37d-9fd6",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8624.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8624.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8003",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80052",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80042",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80069",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80098",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80078",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80023",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80102",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80073",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01346",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80082",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8624"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8624.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8624.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037192",
                    "reference_id": "1037192",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037192"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388390",
                    "reference_id": "1388390",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388390"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/94103",
                    "reference_id": "94103",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/94103"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20161102J.html",
                    "reference_id": "adv_20161102J.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_20161102J.html"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5%40%3Ccommits.pulsar.apache.org%3E",
                    "reference_id": "rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5%40%3Ccommits.pulsar.apache.org%3E",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5%40%3Ccommits.pulsar.apache.org%3E"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624",
                    "reference_id": "show_bug.cgi?id=CVE-2016-8624",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73828?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.52.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1"
                }
            ],
            "aliases": [
                "CVE-2016-8624"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e58m-g37d-9fd6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34690?format=api",
            "vulnerability_id": "VCID-eap9-v2gp-fqgh",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3739.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3739.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3739",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77748",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77712",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77711",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77652",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77659",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77686",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77669",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77696",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77702",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01068",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77728",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3739"
                },
                {
                    "reference_url": "https://curl.haxx.se/changes.html#7_49_0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://curl.haxx.se/changes.html#7_49_0"
                },
                {
                    "reference_url": "https://curl.haxx.se/CVE-2016-3739.patch",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://curl.haxx.se/CVE-2016-3739.patch"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20160518.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://curl.haxx.se/docs/adv_20160518.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-3739.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-3739.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3739",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3739"
                },
                {
                    "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149"
                },
                {
                    "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/27/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2024/03/27/4"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/90726",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/90726"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1035907",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1035907"
                },
                {
                    "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.495349",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.495349"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335430",
                    "reference_id": "1335430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335430"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3739",
                    "reference_id": "CVE-2016-3739",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3739"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73828?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.52.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1"
                }
            ],
            "aliases": [
                "CVE-2016-3739"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eap9-v2gp-fqgh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34707?format=api",
            "vulnerability_id": "VCID-fnj3-2du1-4bhx",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:3558",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:3558"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9586.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9586.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9586",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75494",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75492",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75557",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75548",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75506",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75525",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7559",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75578",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9586"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20161221A.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_20161221A.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-9586.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-9586.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.2",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"
                        }
                    ],
                    "url": "https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95019",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95019"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037515",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037515"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406712",
                    "reference_id": "1406712",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1406712"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848958",
                    "reference_id": "848958",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848958"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201612-22",
                    "reference_id": "ASA-201612-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201612-22"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-10",
                    "reference_id": "ASA-201701-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-11",
                    "reference_id": "ASA-201701-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-11"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-7",
                    "reference_id": "ASA-201701-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-8",
                    "reference_id": "ASA-201701-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-9",
                    "reference_id": "ASA-201701-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-112",
                    "reference_id": "AVG-112",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-112"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-113",
                    "reference_id": "AVG-113",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-113"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-114",
                    "reference_id": "AVG-114",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-114"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-115",
                    "reference_id": "AVG-115",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-115"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-116",
                    "reference_id": "AVG-116",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-116"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-117",
                    "reference_id": "AVG-117",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-117"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9586",
                    "reference_id": "CVE-2016-9586",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9586"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3441-1/",
                    "reference_id": "USN-3441-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3441-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3441-2/",
                    "reference_id": "USN-3441-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3441-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73828?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.52.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1"
                }
            ],
            "aliases": [
                "CVE-2016-9586"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fnj3-2du1-4bhx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34708?format=api",
            "vulnerability_id": "VCID-hyqp-z8hb-fqbt",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9594.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9594.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77857",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77906",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77864",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77892",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77874",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77901",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77933",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77917",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77916",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01088",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77954",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9594"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:12Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9594"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20161223.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:12Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_20161223.html"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-9594.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-9594.html"
                },
                {
                    "reference_url": "https://www.tenable.com/security/tns-2017-04",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:12Z/"
                        }
                    ],
                    "url": "https://www.tenable.com/security/tns-2017-04"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95094",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:12Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95094"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037528",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:12Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037528"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408385",
                    "reference_id": "1408385",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1408385"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201612-22",
                    "reference_id": "ASA-201612-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201612-22"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-10",
                    "reference_id": "ASA-201701-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-11",
                    "reference_id": "ASA-201701-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-11"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-7",
                    "reference_id": "ASA-201701-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-8",
                    "reference_id": "ASA-201701-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-9",
                    "reference_id": "ASA-201701-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-112",
                    "reference_id": "AVG-112",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-112"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-113",
                    "reference_id": "AVG-113",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-113"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-114",
                    "reference_id": "AVG-114",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-114"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-115",
                    "reference_id": "AVG-115",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-115"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-116",
                    "reference_id": "AVG-116",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-116"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-117",
                    "reference_id": "AVG-117",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-117"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9594",
                    "reference_id": "CVE-2016-9594",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9594"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:12Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73828?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.52.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1"
                }
            ],
            "aliases": [
                "CVE-2016-9594"
            ],
            "risk_score": 3.6,
            "exploitability": "0.5",
            "weighted_severity": "7.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hyqp-z8hb-fqbt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34701?format=api",
            "vulnerability_id": "VCID-j2cq-q3r9-jfcp",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8620.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8620.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74284",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7429",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74305",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74326",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74306",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74335",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74298",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74253",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00816",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74258",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8620"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8620.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8620.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037192",
                    "reference_id": "1037192",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:04:13Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037192"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388382",
                    "reference_id": "1388382",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388382"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/94102",
                    "reference_id": "94102",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:04:13Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/94102"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20161102F.html",
                    "reference_id": "adv_20161102F.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:04:13Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_20161102F.html"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:04:13Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8620",
                    "reference_id": "show_bug.cgi?id=CVE-2016-8620",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:04:13Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8620"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73828?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.52.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1"
                }
            ],
            "aliases": [
                "CVE-2016-8620"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j2cq-q3r9-jfcp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34692?format=api",
            "vulnerability_id": "VCID-jeqg-g3en-5udw",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5420.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5420.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5420",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77847",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77944",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77907",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77906",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77854",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77882",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77864",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77891",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77896",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77923",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-5420"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-5420.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-5420.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362190",
                    "reference_id": "1362190",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362190"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2575",
                    "reference_id": "RHSA-2016:2575",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2575"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2957",
                    "reference_id": "RHSA-2016:2957",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2957"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3048-1/",
                    "reference_id": "USN-3048-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3048-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73828?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.52.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1"
                }
            ],
            "aliases": [
                "CVE-2016-5420"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jeqg-g3en-5udw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34702?format=api",
            "vulnerability_id": "VCID-jqqf-gmd3-ubcd",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8621.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8621.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84617",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84539",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84608",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84627",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84622",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84638",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84555",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84576",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8458",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0226",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84601",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8621"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8621.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8621.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037192",
                    "reference_id": "1037192",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037192"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388385",
                    "reference_id": "1388385",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388385"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/94101",
                    "reference_id": "94101",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/94101"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20161102G.html",
                    "reference_id": "adv_20161102G.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_20161102G.html"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://curl.haxx.se/CVE-2016-8621.patch",
                    "reference_id": "CVE-2016-8621.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/CVE-2016-8621.patch"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621",
                    "reference_id": "show_bug.cgi?id=CVE-2016-8621",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73828?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.52.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1"
                }
            ],
            "aliases": [
                "CVE-2016-8621"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jqqf-gmd3-ubcd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34700?format=api",
            "vulnerability_id": "VCID-jtw4-af4y-nkbk",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8619.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8619.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86359",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86441",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8637",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86387",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86389",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86408",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86418",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86432",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8643",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02935",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86425",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8619"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8619.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8619.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388379",
                    "reference_id": "1388379",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388379"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73828?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.52.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1"
                }
            ],
            "aliases": [
                "CVE-2016-8619"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jtw4-af4y-nkbk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34695?format=api",
            "vulnerability_id": "VCID-k8kj-q1je-f7bt",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7167.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7167.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7167",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84631",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84726",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84696",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84715",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8471",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84704",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84646",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84666",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84667",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84689",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7167"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-7167.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-7167.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375906",
                    "reference_id": "1375906",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375906"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837945",
                    "reference_id": "837945",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837945"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201609-18",
                    "reference_id": "ASA-201609-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201609-18"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201609-19",
                    "reference_id": "ASA-201609-19",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201609-19"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-20",
                    "reference_id": "AVG-20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-20"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-21",
                    "reference_id": "AVG-21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Low",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-21"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:2016",
                    "reference_id": "RHSA-2017:2016",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:2016"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73828?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.52.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1"
                }
            ],
            "aliases": [
                "CVE-2016-7167"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k8kj-q1je-f7bt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34688?format=api",
            "vulnerability_id": "VCID-t753-w1ha-kqaz",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8151.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8151.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8151",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62234",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62074",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62134",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62166",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62184",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62202",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6222",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6221",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62189",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8151"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2014-8151.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2014-8151.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178698",
                    "reference_id": "1178698",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178698"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73828?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.52.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1"
                }
            ],
            "aliases": [
                "CVE-2014-8151"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t753-w1ha-kqaz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34696?format=api",
            "vulnerability_id": "VCID-vxpj-xygq-9be2",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8615.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8615.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84774",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84808",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8481",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84832",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84839",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84857",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84854",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84849",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8487",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84789",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8615"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8615.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8615.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037192",
                    "reference_id": "1037192",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037192"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388370",
                    "reference_id": "1388370",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388370"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/94096",
                    "reference_id": "94096",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/94096"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20161102A.html",
                    "reference_id": "adv_20161102A.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_20161102A.html"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://curl.haxx.se/CVE-2016-8615.patch",
                    "reference_id": "CVE-2016-8615.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/CVE-2016-8615.patch"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615",
                    "reference_id": "show_bug.cgi?id=CVE-2016-8615",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73828?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.52.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1"
                }
            ],
            "aliases": [
                "CVE-2016-8615"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vxpj-xygq-9be2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34699?format=api",
            "vulnerability_id": "VCID-vyk2-s5ut-ubbz",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8618.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8618.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81967",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82068",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81997",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82024",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82031",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82051",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8204",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82033",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81978",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01654",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82001",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8618"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8618.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8618.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388378",
                    "reference_id": "1388378",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388378"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73828?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.52.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1"
                }
            ],
            "aliases": [
                "CVE-2016-8618"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vyk2-s5ut-ubbz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34706?format=api",
            "vulnerability_id": "VCID-yxks-8529-23bj",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8625.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8625.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8625",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81219",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8132",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81228",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81251",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8125",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81278",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81283",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81304",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8129",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8625"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8625.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8625.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388392",
                    "reference_id": "1388392",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388392"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73828?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.52.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1"
                }
            ],
            "aliases": [
                "CVE-2016-8625"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yxks-8529-23bj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34698?format=api",
            "vulnerability_id": "VCID-zxz2-xfpd-pbay",
            "summary": "Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8617.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8617.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19714",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19573",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19763",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19488",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19567",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19619",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19623",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19575",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19517",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00063",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19482",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-8617"
                },
                {
                    "reference_url": "https://curl.se/docs/CVE-2016-8617.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://curl.se/docs/CVE-2016-8617.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1037192",
                    "reference_id": "1037192",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/"
                        }
                    ],
                    "url": "http://www.securitytracker.com/id/1037192"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388377",
                    "reference_id": "1388377",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1388377"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/94097",
                    "reference_id": "94097",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/94097"
                },
                {
                    "reference_url": "https://curl.haxx.se/docs/adv_20161102C.html",
                    "reference_id": "adv_20161102C.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/docs/adv_20161102C.html"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-10",
                    "reference_id": "ASA-201611-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-10"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-4",
                    "reference_id": "ASA-201611-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-5",
                    "reference_id": "ASA-201611-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-7",
                    "reference_id": "ASA-201611-7",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-7"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-8",
                    "reference_id": "ASA-201611-8",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-8"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-9",
                    "reference_id": "ASA-201611-9",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-9"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-60",
                    "reference_id": "AVG-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-60"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-61",
                    "reference_id": "AVG-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-61"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-62",
                    "reference_id": "AVG-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-62"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-63",
                    "reference_id": "AVG-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-63"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-65",
                    "reference_id": "AVG-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-65"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-66",
                    "reference_id": "AVG-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-66"
                },
                {
                    "reference_url": "https://curl.haxx.se/CVE-2016-8617.patch",
                    "reference_id": "CVE-2016-8617.patch",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/"
                        }
                    ],
                    "url": "https://curl.haxx.se/CVE-2016-8617.patch"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-47",
                    "reference_id": "GLSA-201701-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-47"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617",
                    "reference_id": "show_bug.cgi?id=CVE-2016-8617",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3123-1/",
                    "reference_id": "USN-3123-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3123-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73828?format=api",
                    "purl": "pkg:ebuild/net-misc/curl@7.52.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1"
                }
            ],
            "aliases": [
                "CVE-2016-8617"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zxz2-xfpd-pbay"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/curl@7.52.1"
}