Search for packages
| purl | pkg:generic/curl.se/curl@7.65.2 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-1k8f-qgcv-xkhb
Aliases: CVE-2022-27782 |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
Affected by 40 other vulnerabilities. |
|
VCID-2cx5-1qnw-uufj
Aliases: CVE-2026-1965 |
curl: curl: Authentication bypass due to incorrect connection reuse with Negotiate authentication |
Affected by 0 other vulnerabilities. |
|
VCID-2xmp-jc8v-bucb
Aliases: CVE-2022-35252 |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
Affected by 39 other vulnerabilities. |
|
VCID-3sy2-4f3g-zkac
Aliases: CVE-2022-27774 |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
Affected by 46 other vulnerabilities. |
|
VCID-47qb-2qkw-1qej
Aliases: CVE-2023-28321 |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
Affected by 22 other vulnerabilities. |
|
VCID-56wg-yafz-gkgx
Aliases: CVE-2021-22922 |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
Affected by 48 other vulnerabilities. |
|
VCID-6we4-n888-6qhe
Aliases: CVE-2025-0725 |
libcurl: Buffer Overflow in libcurl via zlib Integer Overflow |
Affected by 13 other vulnerabilities. |
|
VCID-75nw-4e2d-zqgg
Aliases: CVE-2024-7264 |
curl: libcurl: ASN.1 date parser overread |
Affected by 17 other vulnerabilities. |
|
VCID-7srk-hshe-h3f4
Aliases: CVE-2023-27538 |
Improper Authentication An authentication bypass vulnerability exists in libcurl v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection. |
Affected by 26 other vulnerabilities. |
|
VCID-8zks-th64-33b8
Aliases: CVE-2026-3784 |
curl: curl: Unauthorized access due to improper HTTP proxy connection reuse |
Affected by 0 other vulnerabilities. |
|
VCID-9ggp-5wfj-ufcq
Aliases: CVE-2022-43552 |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
Affected by 34 other vulnerabilities. |
|
VCID-9nak-pscy-e7gs
Aliases: CVE-2022-32221 |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
Affected by 35 other vulnerabilities. |
|
VCID-arjz-67yz-wkg9
Aliases: CVE-2023-27533 |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
Affected by 26 other vulnerabilities. |
|
VCID-bb2f-7qrm-1kca
Aliases: CVE-2022-27781 |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
Affected by 40 other vulnerabilities. |
|
VCID-cbah-e86c-w3fj
Aliases: CVE-2023-27535 |
Improper Authentication An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information. |
Affected by 26 other vulnerabilities. |
|
VCID-cp4n-p2z3-43b4
Aliases: CVE-2020-8177 |
Multiple vulnerabilities have been found in cURL, the worst of which could result in information disclosure or data loss. |
Affected by 52 other vulnerabilities. |
|
VCID-d3s1-3qs7-2uhw
Aliases: CVE-2021-22897 |
curl: Cipher settings shared for all connections when using schannel TLS backed |
Affected by 53 other vulnerabilities. |
|
VCID-dc3c-3wab-57gh
Aliases: CVE-2021-22926 |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
Affected by 48 other vulnerabilities. |
|
VCID-ddgz-rczw-jqfw
Aliases: CVE-2023-28320 |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
Affected by 22 other vulnerabilities. |
|
VCID-dhrf-2sz5-3bhf
Aliases: CVE-2019-5481 |
Multiple vulnerabilities have been found in cURL, the worst of which may lead to arbitrary code execution. |
Affected by 50 other vulnerabilities. |
|
VCID-etzn-uhck-h7b2
Aliases: CVE-2026-3783 |
curl: curl: Information disclosure via OAuth2 bearer token leakage during HTTP(S) redirect |
Affected by 0 other vulnerabilities. |
|
VCID-frgg-29yv-dyf7
Aliases: CVE-2021-22890 |
Multiple vulnerabilities have been found in cURL, the worst of which could result in the arbitrary execution of code. |
Affected by 51 other vulnerabilities. |
|
VCID-ggt7-eejg-xfb6
Aliases: CVE-2021-22876 |
Multiple vulnerabilities have been found in cURL, the worst of which could result in the arbitrary execution of code. |
Affected by 51 other vulnerabilities. |
|
VCID-gnx2-djyk-uyaf
Aliases: CVE-2023-38546 |
Cookie injection with none file This flaw allows an attacker to insert cookies at will into a running program using libcurl, if the specific series of conditions are met. libcurl performs transfers. In its API, an application creates "easy handles" that are the individual handles for single transfers. libcurl provides a function call that duplicates en easy handle called [curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html). If a transfer has cookies enabled when the handle is duplicated, the cookie-enable state is also cloned - but without cloning the actual cookies. If the source handle does not read any cookies from a specific file on disk, the cloned version of the handle would instead store the file name as `none` (using the four ASCII letters, no quotes). Subsequent use of the cloned handle that does not explicitly set a source to load cookies from would then inadvertently load cookies from a file named `none` - if such a file exists and is readable in the current directory of the program using libcurl. And if using the correct file format of course. |
Affected by 19 other vulnerabilities. |
|
VCID-hrsy-694u-2fec
Aliases: CVE-2024-8096 |
curl: OCSP stapling bypass with GnuTLS |
Affected by 16 other vulnerabilities. |
|
VCID-hudt-78dw-tkf2
Aliases: CVE-2021-22925 |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
Affected by 48 other vulnerabilities. |
|
VCID-j5s3-rr74-nqb8
Aliases: CVE-2020-8169 |
Multiple vulnerabilities have been found in cURL, the worst of which could result in information disclosure or data loss. |
Affected by 52 other vulnerabilities. |
|
VCID-ju6h-a1sz-f7e5
Aliases: CVE-2020-8285 |
Multiple vulnerabilities have been found in cURL, the worst of which could result in information disclosure or data loss. |
Affected by 50 other vulnerabilities. |
|
VCID-mkyr-w79c-qqfz
Aliases: CVE-2025-14017 |
curl: curl: Security bypass due to global TLS option changes in multi-threaded LDAPS transfers |
Affected by 4 other vulnerabilities. |
|
VCID-ms2r-94ph-yyh3
Aliases: CVE-2023-27536 |
Improper Authentication An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed. |
Affected by 26 other vulnerabilities. |
|
VCID-n51k-39uk-auca
Aliases: CVE-2020-8286 |
Multiple vulnerabilities have been found in cURL, the worst of which could result in information disclosure or data loss. |
Affected by 50 other vulnerabilities. |
|
VCID-n57n-cymy-z7dr
Aliases: CVE-2023-23916 |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
Affected by 32 other vulnerabilities. |
|
VCID-nvzd-v3bs-6qek
Aliases: CVE-2025-15079 |
When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file. |
Affected by 4 other vulnerabilities. |
|
VCID-ph5u-5j8n-4qah
Aliases: CVE-2021-22898 |
Multiple vulnerabilities have been found in cURL, the worst of which could result in the arbitrary execution of code. |
Affected by 53 other vulnerabilities. |
|
VCID-q229-ag6u-u3hv
Aliases: CVE-2022-22576 |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
Affected by 46 other vulnerabilities. |
|
VCID-qbpd-star-6fgn
Aliases: CVE-2021-22923 |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
Affected by 48 other vulnerabilities. |
|
VCID-qdcn-2u3v-b3cv
Aliases: CVE-2023-46218 |
Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. |
Affected by 20 other vulnerabilities. |
|
VCID-r7bh-7wur-xffs
Aliases: CVE-2022-27776 |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
Affected by 46 other vulnerabilities. |
|
VCID-rmez-cwu2-2ya7
Aliases: CVE-2020-8284 |
Multiple vulnerabilities have been found in cURL, the worst of which could result in information disclosure or data loss. |
Affected by 50 other vulnerabilities. |
|
VCID-s73y-y7v7-43cm
Aliases: CVE-2023-28322 |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
Affected by 22 other vulnerabilities. |
|
VCID-sh5a-fmna-wffr
Aliases: CVE-2021-22946 |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
Affected by 45 other vulnerabilities. |
|
VCID-syz5-5y6f-s7er
Aliases: CVE-2023-27534 |
Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. |
Affected by 26 other vulnerabilities. |
|
VCID-t4gn-9fw8-gkc3
Aliases: CVE-2021-22947 |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
Affected by 45 other vulnerabilities. |
|
VCID-t8t6-9wa3-aub7
Aliases: CVE-2022-27775 |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
Affected by 46 other vulnerabilities. |
|
VCID-u4bx-xqb3-vuef
Aliases: CVE-2024-2398 |
Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. |
Affected by 17 other vulnerabilities. |
|
VCID-vbbv-k1r7-kkas
Aliases: CVE-2025-15224 |
When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent. |
Affected by 4 other vulnerabilities. |
|
VCID-wwam-tcmv-kqhc
Aliases: CVE-2019-5482 |
Multiple vulnerabilities have been found in cURL, the worst of which may lead to arbitrary code execution. |
Affected by 50 other vulnerabilities. |
|
VCID-x57x-w8g8-7ybz
Aliases: CVE-2025-14524 |
When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host. |
Affected by 4 other vulnerabilities. |
|
VCID-xzay-sjpy-3yce
Aliases: CVE-2022-32206 |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
Affected by 39 other vulnerabilities. |
|
VCID-y32p-52ps-4ug4
Aliases: CVE-2021-22924 |
Use of Incorrectly-Resolved Name or Reference libcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function does not take `issuercert` into account and it compared the involved paths *case insensitively*, which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn't include the `issuer cert` which a transfer can set to qualify how to verify the server certificate. |
Affected by 48 other vulnerabilities. |
|
VCID-y4x5-n5m2-x7bq
Aliases: CVE-2022-32208 |
Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution. |
Affected by 39 other vulnerabilities. |
|
VCID-yvdd-ataf-ckf1
Aliases: CVE-2020-8231 |
Multiple vulnerabilities have been found in cURL, the worst of which could result in information disclosure or data loss. |
Affected by 51 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T18:21:37.294961+00:00 | Curl Importer | Affected by | VCID-wwam-tcmv-kqhc | https://curl.se/docs/CVE-2019-5482.json | 38.0.0 |
| 2026-04-01T18:21:36.966545+00:00 | Curl Importer | Affected by | VCID-dhrf-2sz5-3bhf | https://curl.se/docs/CVE-2019-5481.json | 38.0.0 |
| 2026-04-01T18:21:36.836399+00:00 | Curl Importer | Affected by | VCID-j5s3-rr74-nqb8 | https://curl.se/docs/CVE-2020-8169.json | 38.0.0 |
| 2026-04-01T18:21:36.760334+00:00 | Curl Importer | Affected by | VCID-cp4n-p2z3-43b4 | https://curl.se/docs/CVE-2020-8177.json | 38.0.0 |
| 2026-04-01T18:21:36.429260+00:00 | Curl Importer | Affected by | VCID-yvdd-ataf-ckf1 | https://curl.se/docs/CVE-2020-8231.json | 38.0.0 |
| 2026-04-01T18:21:36.158240+00:00 | Curl Importer | Affected by | VCID-rmez-cwu2-2ya7 | https://curl.se/docs/CVE-2020-8284.json | 38.0.0 |
| 2026-04-01T18:21:35.390555+00:00 | Curl Importer | Affected by | VCID-ju6h-a1sz-f7e5 | https://curl.se/docs/CVE-2020-8285.json | 38.0.0 |
| 2026-04-01T18:21:35.059461+00:00 | Curl Importer | Affected by | VCID-n51k-39uk-auca | https://curl.se/docs/CVE-2020-8286.json | 38.0.0 |
| 2026-04-01T18:21:34.838658+00:00 | Curl Importer | Affected by | VCID-ggt7-eejg-xfb6 | https://curl.se/docs/CVE-2021-22876.json | 38.0.0 |
| 2026-04-01T18:21:34.213006+00:00 | Curl Importer | Affected by | VCID-frgg-29yv-dyf7 | https://curl.se/docs/CVE-2021-22890.json | 38.0.0 |
| 2026-04-01T18:21:34.111420+00:00 | Curl Importer | Affected by | VCID-d3s1-3qs7-2uhw | https://curl.se/docs/CVE-2021-22897.json | 38.0.0 |
| 2026-04-01T18:21:33.998846+00:00 | Curl Importer | Affected by | VCID-ph5u-5j8n-4qah | https://curl.se/docs/CVE-2021-22898.json | 38.0.0 |
| 2026-04-01T18:21:33.390666+00:00 | Curl Importer | Affected by | VCID-56wg-yafz-gkgx | https://curl.se/docs/CVE-2021-22922.json | 38.0.0 |
| 2026-04-01T18:21:33.090921+00:00 | Curl Importer | Affected by | VCID-qbpd-star-6fgn | https://curl.se/docs/CVE-2021-22923.json | 38.0.0 |
| 2026-04-01T18:21:32.790112+00:00 | Curl Importer | Affected by | VCID-y32p-52ps-4ug4 | https://curl.se/docs/CVE-2021-22924.json | 38.0.0 |
| 2026-04-01T18:21:32.235737+00:00 | Curl Importer | Affected by | VCID-hudt-78dw-tkf2 | https://curl.se/docs/CVE-2021-22925.json | 38.0.0 |
| 2026-04-01T18:21:31.643599+00:00 | Curl Importer | Affected by | VCID-dc3c-3wab-57gh | https://curl.se/docs/CVE-2021-22926.json | 38.0.0 |
| 2026-04-01T18:21:31.299351+00:00 | Curl Importer | Affected by | VCID-sh5a-fmna-wffr | https://curl.se/docs/CVE-2021-22946.json | 38.0.0 |
| 2026-04-01T18:21:30.936242+00:00 | Curl Importer | Affected by | VCID-t4gn-9fw8-gkc3 | https://curl.se/docs/CVE-2021-22947.json | 38.0.0 |
| 2026-04-01T18:21:30.557779+00:00 | Curl Importer | Affected by | VCID-q229-ag6u-u3hv | https://curl.se/docs/CVE-2022-22576.json | 38.0.0 |
| 2026-04-01T18:21:30.184784+00:00 | Curl Importer | Affected by | VCID-3sy2-4f3g-zkac | https://curl.se/docs/CVE-2022-27774.json | 38.0.0 |
| 2026-04-01T18:21:29.438218+00:00 | Curl Importer | Affected by | VCID-t8t6-9wa3-aub7 | https://curl.se/docs/CVE-2022-27775.json | 38.0.0 |
| 2026-04-01T18:21:29.317161+00:00 | Curl Importer | Affected by | VCID-r7bh-7wur-xffs | https://curl.se/docs/CVE-2022-27776.json | 38.0.0 |
| 2026-04-01T18:21:28.471887+00:00 | Curl Importer | Affected by | VCID-bb2f-7qrm-1kca | https://curl.se/docs/CVE-2022-27781.json | 38.0.0 |
| 2026-04-01T18:21:28.180387+00:00 | Curl Importer | Affected by | VCID-1k8f-qgcv-xkhb | https://curl.se/docs/CVE-2022-27782.json | 38.0.0 |
| 2026-04-01T18:21:27.606060+00:00 | Curl Importer | Affected by | VCID-xzay-sjpy-3yce | https://curl.se/docs/CVE-2022-32206.json | 38.0.0 |
| 2026-04-01T18:21:27.343570+00:00 | Curl Importer | Affected by | VCID-y4x5-n5m2-x7bq | https://curl.se/docs/CVE-2022-32208.json | 38.0.0 |
| 2026-04-01T18:21:26.916467+00:00 | Curl Importer | Affected by | VCID-2xmp-jc8v-bucb | https://curl.se/docs/CVE-2022-35252.json | 38.0.0 |
| 2026-04-01T18:21:26.144278+00:00 | Curl Importer | Affected by | VCID-9nak-pscy-e7gs | https://curl.se/docs/CVE-2022-32221.json | 38.0.0 |
| 2026-04-01T18:21:25.265228+00:00 | Curl Importer | Affected by | VCID-9ggp-5wfj-ufcq | https://curl.se/docs/CVE-2022-43552.json | 38.0.0 |
| 2026-04-01T18:21:24.621502+00:00 | Curl Importer | Affected by | VCID-n57n-cymy-z7dr | https://curl.se/docs/CVE-2023-23916.json | 38.0.0 |
| 2026-04-01T18:21:24.438109+00:00 | Curl Importer | Affected by | VCID-arjz-67yz-wkg9 | https://curl.se/docs/CVE-2023-27533.json | 38.0.0 |
| 2026-04-01T18:21:23.835034+00:00 | Curl Importer | Affected by | VCID-syz5-5y6f-s7er | https://curl.se/docs/CVE-2023-27534.json | 38.0.0 |
| 2026-04-01T18:21:23.411131+00:00 | Curl Importer | Affected by | VCID-cbah-e86c-w3fj | https://curl.se/docs/CVE-2023-27535.json | 38.0.0 |
| 2026-04-01T18:21:22.914150+00:00 | Curl Importer | Affected by | VCID-ms2r-94ph-yyh3 | https://curl.se/docs/CVE-2023-27536.json | 38.0.0 |
| 2026-04-01T18:21:22.499294+00:00 | Curl Importer | Affected by | VCID-7srk-hshe-h3f4 | https://curl.se/docs/CVE-2023-27538.json | 38.0.0 |
| 2026-04-01T18:21:21.947002+00:00 | Curl Importer | Affected by | VCID-ddgz-rczw-jqfw | https://curl.se/docs/CVE-2023-28320.json | 38.0.0 |
| 2026-04-01T18:21:21.374929+00:00 | Curl Importer | Affected by | VCID-47qb-2qkw-1qej | https://curl.se/docs/CVE-2023-28321.json | 38.0.0 |
| 2026-04-01T18:21:20.863539+00:00 | Curl Importer | Affected by | VCID-s73y-y7v7-43cm | https://curl.se/docs/CVE-2023-28322.json | 38.0.0 |
| 2026-04-01T18:21:20.008465+00:00 | Curl Importer | Affected by | VCID-gnx2-djyk-uyaf | https://curl.se/docs/CVE-2023-38546.json | 38.0.0 |
| 2026-04-01T18:21:19.365271+00:00 | Curl Importer | Affected by | VCID-qdcn-2u3v-b3cv | https://curl.se/docs/CVE-2023-46218.json | 38.0.0 |
| 2026-04-01T18:21:18.841675+00:00 | Curl Importer | Affected by | VCID-u4bx-xqb3-vuef | https://curl.se/docs/CVE-2024-2398.json | 38.0.0 |
| 2026-04-01T18:21:18.407232+00:00 | Curl Importer | Affected by | VCID-75nw-4e2d-zqgg | https://curl.se/docs/CVE-2024-7264.json | 38.0.0 |
| 2026-04-01T18:21:18.008971+00:00 | Curl Importer | Affected by | VCID-hrsy-694u-2fec | https://curl.se/docs/CVE-2024-8096.json | 38.0.0 |
| 2026-04-01T18:21:17.130084+00:00 | Curl Importer | Affected by | VCID-6we4-n888-6qhe | https://curl.se/docs/CVE-2025-0725.json | 38.0.0 |
| 2026-04-01T18:21:15.936044+00:00 | Curl Importer | Affected by | VCID-mkyr-w79c-qqfz | https://curl.se/docs/CVE-2025-14017.json | 38.0.0 |
| 2026-04-01T18:21:15.394238+00:00 | Curl Importer | Affected by | VCID-x57x-w8g8-7ybz | https://curl.se/docs/CVE-2025-14524.json | 38.0.0 |
| 2026-04-01T18:21:14.862075+00:00 | Curl Importer | Affected by | VCID-nvzd-v3bs-6qek | https://curl.se/docs/CVE-2025-15079.json | 38.0.0 |
| 2026-04-01T18:21:14.583014+00:00 | Curl Importer | Affected by | VCID-vbbv-k1r7-kkas | https://curl.se/docs/CVE-2025-15224.json | 38.0.0 |
| 2026-04-01T18:21:14.302284+00:00 | Curl Importer | Affected by | VCID-2cx5-1qnw-uufj | https://curl.se/docs/CVE-2026-1965.json | 38.0.0 |
| 2026-04-01T18:21:13.666923+00:00 | Curl Importer | Affected by | VCID-etzn-uhck-h7b2 | https://curl.se/docs/CVE-2026-3783.json | 38.0.0 |
| 2026-04-01T18:21:13.197875+00:00 | Curl Importer | Affected by | VCID-8zks-th64-33b8 | https://curl.se/docs/CVE-2026-3784.json | 38.0.0 |