Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/httpd24-nghttp2@1.7.1-7?arch=el6
Typerpm
Namespaceredhat
Namehttpd24-nghttp2
Version1.7.1-7
Qualifiers
arch el6
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1mf9-u8y1-zbb1
vulnerability_id VCID-1mf9-u8y1-zbb1
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may allow attackers to bypass intended restrictions.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3558
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000101.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000101.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000101
reference_id
reference_type
scores
0
value 0.00624
scoring_system epss
scoring_elements 0.70084
published_at 2026-04-01T12:55:00Z
1
value 0.00624
scoring_system epss
scoring_elements 0.70147
published_at 2026-04-13T12:55:00Z
2
value 0.00624
scoring_system epss
scoring_elements 0.70111
published_at 2026-04-04T12:55:00Z
3
value 0.00624
scoring_system epss
scoring_elements 0.70088
published_at 2026-04-07T12:55:00Z
4
value 0.00624
scoring_system epss
scoring_elements 0.70135
published_at 2026-04-08T12:55:00Z
5
value 0.00624
scoring_system epss
scoring_elements 0.70151
published_at 2026-04-09T12:55:00Z
6
value 0.00624
scoring_system epss
scoring_elements 0.70175
published_at 2026-04-11T12:55:00Z
7
value 0.00624
scoring_system epss
scoring_elements 0.7016
published_at 2026-04-12T12:55:00Z
8
value 0.00624
scoring_system epss
scoring_elements 0.70096
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000101
3
reference_url https://curl.haxx.se/docs/adv_20170809A.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_20170809A.html
4
reference_url https://curl.se/docs/CVE-2017-1000101.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2017-1000101.html
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://support.apple.com/HT208221
reference_id
reference_type
scores
url https://support.apple.com/HT208221
10
reference_url http://www.debian.org/security/2017/dsa-3992
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3992
11
reference_url http://www.securityfocus.com/bid/100249
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100249
12
reference_url http://www.securitytracker.com/id/1039117
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039117
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1478309
reference_id 1478309
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1478309
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871554
reference_id 871554
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871554
15
reference_url https://security.archlinux.org/ASA-201708-16
reference_id ASA-201708-16
reference_type
scores
url https://security.archlinux.org/ASA-201708-16
16
reference_url https://security.archlinux.org/AVG-370
reference_id AVG-370
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-370
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.37.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.47.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.49.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.49.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.49.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.49.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.49.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.49.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.50.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.50.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.50.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.50.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.51.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.51.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.51.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.52.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.52.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.52.0:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.52.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.52.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.52.1:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.53.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.0:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.54.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.54.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.54.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.54.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.54.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.54.1:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.55.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.55.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.55.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000101
reference_id CVE-2017-1000101
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000101
50
reference_url https://security.gentoo.org/glsa/201709-14
reference_id GLSA-201709-14
reference_type
scores
url https://security.gentoo.org/glsa/201709-14
51
reference_url https://usn.ubuntu.com/3441-1/
reference_id USN-3441-1
reference_type
scores
url https://usn.ubuntu.com/3441-1/
fixed_packages
aliases CVE-2017-1000101
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1mf9-u8y1-zbb1
1
url VCID-26ju-84rx-c7b9
vulnerability_id VCID-26ju-84rx-c7b9
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may allow attackers to bypass intended restrictions.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3558
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7407.json
reference_id
reference_type
scores
0
value 2.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7407.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7407
reference_id
reference_type
scores
0
value 0.00282
scoring_system epss
scoring_elements 0.51472
published_at 2026-04-01T12:55:00Z
1
value 0.00282
scoring_system epss
scoring_elements 0.51572
published_at 2026-04-13T12:55:00Z
2
value 0.00282
scoring_system epss
scoring_elements 0.51509
published_at 2026-04-07T12:55:00Z
3
value 0.00282
scoring_system epss
scoring_elements 0.51563
published_at 2026-04-08T12:55:00Z
4
value 0.00282
scoring_system epss
scoring_elements 0.5156
published_at 2026-04-09T12:55:00Z
5
value 0.00282
scoring_system epss
scoring_elements 0.51604
published_at 2026-04-11T12:55:00Z
6
value 0.00282
scoring_system epss
scoring_elements 0.51583
published_at 2026-04-12T12:55:00Z
7
value 0.00282
scoring_system epss
scoring_elements 0.51523
published_at 2026-04-02T12:55:00Z
8
value 0.00282
scoring_system epss
scoring_elements 0.51549
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7407
3
reference_url https://curl.se/docs/CVE-2017-7407.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2017-7407.html
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:P/I:N/A:N
1
value 2.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13
reference_id
reference_type
scores
url https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13
7
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1439190
reference_id 1439190
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1439190
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859500
reference_id 859500
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859500
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7407
reference_id CVE-2017-7407
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
1
value 2.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-7407
12
reference_url https://security.gentoo.org/glsa/201709-14
reference_id GLSA-201709-14
reference_type
scores
url https://security.gentoo.org/glsa/201709-14
13
reference_url https://usn.ubuntu.com/3441-1/
reference_id USN-3441-1
reference_type
scores
url https://usn.ubuntu.com/3441-1/
14
reference_url https://usn.ubuntu.com/3441-2/
reference_id USN-3441-2
reference_type
scores
url https://usn.ubuntu.com/3441-2/
fixed_packages
aliases CVE-2017-7407
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-26ju-84rx-c7b9
2
url VCID-5jan-pqf6-fyhr
vulnerability_id VCID-5jan-pqf6-fyhr
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8622.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8622.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8622
reference_id
reference_type
scores
0
value 0.01634
scoring_system epss
scoring_elements 0.81845
published_at 2026-04-01T12:55:00Z
1
value 0.01634
scoring_system epss
scoring_elements 0.81911
published_at 2026-04-13T12:55:00Z
2
value 0.01634
scoring_system epss
scoring_elements 0.81875
published_at 2026-04-07T12:55:00Z
3
value 0.01634
scoring_system epss
scoring_elements 0.81901
published_at 2026-04-08T12:55:00Z
4
value 0.01634
scoring_system epss
scoring_elements 0.81908
published_at 2026-04-09T12:55:00Z
5
value 0.01634
scoring_system epss
scoring_elements 0.81927
published_at 2026-04-11T12:55:00Z
6
value 0.01634
scoring_system epss
scoring_elements 0.81915
published_at 2026-04-12T12:55:00Z
7
value 0.01634
scoring_system epss
scoring_elements 0.81856
published_at 2026-04-02T12:55:00Z
8
value 0.01634
scoring_system epss
scoring_elements 0.81879
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8622
2
reference_url https://curl.se/docs/CVE-2016-8622.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8622.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388386
reference_id 1388386
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388386
15
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
16
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
17
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
18
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
19
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
20
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
21
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
22
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
aliases CVE-2016-8622
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5jan-pqf6-fyhr
3
url VCID-6muy-xpdq-9kg8
vulnerability_id VCID-6muy-xpdq-9kg8
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8616.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8616.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8616
reference_id
reference_type
scores
0
value 0.0413
scoring_system epss
scoring_elements 0.88589
published_at 2026-04-01T12:55:00Z
1
value 0.0413
scoring_system epss
scoring_elements 0.88645
published_at 2026-04-13T12:55:00Z
2
value 0.0413
scoring_system epss
scoring_elements 0.88598
published_at 2026-04-02T12:55:00Z
3
value 0.0413
scoring_system epss
scoring_elements 0.88616
published_at 2026-04-04T12:55:00Z
4
value 0.0413
scoring_system epss
scoring_elements 0.88617
published_at 2026-04-07T12:55:00Z
5
value 0.0413
scoring_system epss
scoring_elements 0.88635
published_at 2026-04-08T12:55:00Z
6
value 0.0413
scoring_system epss
scoring_elements 0.8864
published_at 2026-04-09T12:55:00Z
7
value 0.0413
scoring_system epss
scoring_elements 0.88652
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8616
2
reference_url https://curl.se/docs/CVE-2016-8616.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8616.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388371
reference_id 1388371
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388371
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
20
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
21
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
22
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
23
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
24
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
25
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
26
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
27
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
28
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
aliases CVE-2016-8616
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6muy-xpdq-9kg8
4
url VCID-6yb7-t8qs-cbch
vulnerability_id VCID-6yb7-t8qs-cbch
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000007.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000007.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000007
reference_id
reference_type
scores
0
value 0.03344
scoring_system epss
scoring_elements 0.87269
published_at 2026-04-02T12:55:00Z
1
value 0.03344
scoring_system epss
scoring_elements 0.87259
published_at 2026-04-01T12:55:00Z
2
value 0.03344
scoring_system epss
scoring_elements 0.87302
published_at 2026-04-08T12:55:00Z
3
value 0.03344
scoring_system epss
scoring_elements 0.87283
published_at 2026-04-07T12:55:00Z
4
value 0.03344
scoring_system epss
scoring_elements 0.87285
published_at 2026-04-04T12:55:00Z
5
value 0.03871
scoring_system epss
scoring_elements 0.88231
published_at 2026-04-13T12:55:00Z
6
value 0.03871
scoring_system epss
scoring_elements 0.88227
published_at 2026-04-09T12:55:00Z
7
value 0.03871
scoring_system epss
scoring_elements 0.88238
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000007
2
reference_url https://curl.se/docs/CVE-2018-1000007.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-1000007.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1537125
reference_id 1537125
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1537125
6
reference_url https://security.archlinux.org/ASA-201801-20
reference_id ASA-201801-20
reference_type
scores
url https://security.archlinux.org/ASA-201801-20
7
reference_url https://security.archlinux.org/ASA-201801-22
reference_id ASA-201801-22
reference_type
scores
url https://security.archlinux.org/ASA-201801-22
8
reference_url https://security.archlinux.org/ASA-201801-23
reference_id ASA-201801-23
reference_type
scores
url https://security.archlinux.org/ASA-201801-23
9
reference_url https://security.archlinux.org/ASA-201801-24
reference_id ASA-201801-24
reference_type
scores
url https://security.archlinux.org/ASA-201801-24
10
reference_url https://security.archlinux.org/ASA-201801-25
reference_id ASA-201801-25
reference_type
scores
url https://security.archlinux.org/ASA-201801-25
11
reference_url https://security.archlinux.org/ASA-201801-26
reference_id ASA-201801-26
reference_type
scores
url https://security.archlinux.org/ASA-201801-26
12
reference_url https://security.archlinux.org/AVG-593
reference_id AVG-593
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-593
13
reference_url https://security.archlinux.org/AVG-594
reference_id AVG-594
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-594
14
reference_url https://security.archlinux.org/AVG-595
reference_id AVG-595
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-595
15
reference_url https://security.archlinux.org/AVG-596
reference_id AVG-596
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-596
16
reference_url https://security.archlinux.org/AVG-597
reference_id AVG-597
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-597
17
reference_url https://security.archlinux.org/AVG-598
reference_id AVG-598
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-598
18
reference_url https://security.gentoo.org/glsa/201804-04
reference_id GLSA-201804-04
reference_type
scores
url https://security.gentoo.org/glsa/201804-04
19
reference_url https://usn.ubuntu.com/3554-1/
reference_id USN-3554-1
reference_type
scores
url https://usn.ubuntu.com/3554-1/
20
reference_url https://usn.ubuntu.com/3554-2/
reference_id USN-3554-2
reference_type
scores
url https://usn.ubuntu.com/3554-2/
fixed_packages
aliases CVE-2018-1000007
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6yb7-t8qs-cbch
5
url VCID-7vt9-pf5q-uqb6
vulnerability_id VCID-7vt9-pf5q-uqb6
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/errata/RHBA-2019:0327
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHBA-2019:0327
1
reference_url https://access.redhat.com/errata/RHSA-2018:3157
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3157
2
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3558
3
reference_url https://access.redhat.com/errata/RHSA-2020:0544
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0544
4
reference_url https://access.redhat.com/errata/RHSA-2020:0594
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0594
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000301.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000301.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000301
reference_id
reference_type
scores
0
value 0.02761
scoring_system epss
scoring_elements 0.85957
published_at 2026-04-01T12:55:00Z
1
value 0.02761
scoring_system epss
scoring_elements 0.8602
published_at 2026-04-13T12:55:00Z
2
value 0.02761
scoring_system epss
scoring_elements 0.85968
published_at 2026-04-02T12:55:00Z
3
value 0.02761
scoring_system epss
scoring_elements 0.85984
published_at 2026-04-07T12:55:00Z
4
value 0.02761
scoring_system epss
scoring_elements 0.86003
published_at 2026-04-08T12:55:00Z
5
value 0.02761
scoring_system epss
scoring_elements 0.86013
published_at 2026-04-09T12:55:00Z
6
value 0.02761
scoring_system epss
scoring_elements 0.86027
published_at 2026-04-11T12:55:00Z
7
value 0.02761
scoring_system epss
scoring_elements 0.86025
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000301
7
reference_url https://curl.haxx.se/docs/adv_2018-b138.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_2018-b138.html
8
reference_url https://curl.se/docs/CVE-2018-1000301.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-1000301.html
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000301
10
reference_url https://lists.debian.org/debian-lts-announce/2018/05/msg00010.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/05/msg00010.html
11
reference_url https://usn.ubuntu.com/3598-2/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3598-2/
12
reference_url https://www.debian.org/security/2018/dsa-4202
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4202
13
reference_url https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
14
reference_url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
15
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
16
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
17
reference_url http://www.securityfocus.com/bid/104225
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/104225
18
reference_url http://www.securitytracker.com/id/1040931
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040931
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1575536
reference_id 1575536
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1575536
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898856
reference_id 898856
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898856
21
reference_url https://security.archlinux.org/ASA-201805-13
reference_id ASA-201805-13
reference_type
scores
url https://security.archlinux.org/ASA-201805-13
22
reference_url https://security.archlinux.org/ASA-201805-14
reference_id ASA-201805-14
reference_type
scores
url https://security.archlinux.org/ASA-201805-14
23
reference_url https://security.archlinux.org/ASA-201805-15
reference_id ASA-201805-15
reference_type
scores
url https://security.archlinux.org/ASA-201805-15
24
reference_url https://security.archlinux.org/ASA-201805-16
reference_id ASA-201805-16
reference_type
scores
url https://security.archlinux.org/ASA-201805-16
25
reference_url https://security.archlinux.org/ASA-201805-17
reference_id ASA-201805-17
reference_type
scores
url https://security.archlinux.org/ASA-201805-17
26
reference_url https://security.archlinux.org/ASA-201805-18
reference_id ASA-201805-18
reference_type
scores
url https://security.archlinux.org/ASA-201805-18
27
reference_url https://security.archlinux.org/AVG-694
reference_id AVG-694
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-694
28
reference_url https://security.archlinux.org/AVG-695
reference_id AVG-695
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-695
29
reference_url https://security.archlinux.org/AVG-696
reference_id AVG-696
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-696
30
reference_url https://security.archlinux.org/AVG-697
reference_id AVG-697
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-697
31
reference_url https://security.archlinux.org/AVG-698
reference_id AVG-698
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-698
32
reference_url https://security.archlinux.org/AVG-699
reference_id AVG-699
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-699
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1000301
reference_id CVE-2018-1000301
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-1000301
52
reference_url https://security.gentoo.org/glsa/201806-05
reference_id GLSA-201806-05
reference_type
scores
url https://security.gentoo.org/glsa/201806-05
53
reference_url https://usn.ubuntu.com/3648-1/
reference_id USN-3648-1
reference_type
scores
url https://usn.ubuntu.com/3648-1/
fixed_packages
aliases CVE-2018-1000301
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7vt9-pf5q-uqb6
6
url VCID-7xxh-66ys-4bhw
vulnerability_id VCID-7xxh-66ys-4bhw
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5419.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5419.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5419
reference_id
reference_type
scores
0
value 0.01968
scoring_system epss
scoring_elements 0.83461
published_at 2026-04-01T12:55:00Z
1
value 0.01968
scoring_system epss
scoring_elements 0.83526
published_at 2026-04-13T12:55:00Z
2
value 0.01968
scoring_system epss
scoring_elements 0.83535
published_at 2026-04-11T12:55:00Z
3
value 0.01968
scoring_system epss
scoring_elements 0.83529
published_at 2026-04-12T12:55:00Z
4
value 0.01968
scoring_system epss
scoring_elements 0.83474
published_at 2026-04-02T12:55:00Z
5
value 0.01968
scoring_system epss
scoring_elements 0.83488
published_at 2026-04-04T12:55:00Z
6
value 0.01968
scoring_system epss
scoring_elements 0.83487
published_at 2026-04-07T12:55:00Z
7
value 0.01968
scoring_system epss
scoring_elements 0.83511
published_at 2026-04-08T12:55:00Z
8
value 0.01968
scoring_system epss
scoring_elements 0.83521
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5419
2
reference_url https://curl.se/docs/CVE-2016-5419.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-5419.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1362183
reference_id 1362183
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1362183
8
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
9
reference_url https://access.redhat.com/errata/RHSA-2016:2575
reference_id RHSA-2016:2575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2575
10
reference_url https://access.redhat.com/errata/RHSA-2016:2957
reference_id RHSA-2016:2957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2957
11
reference_url https://usn.ubuntu.com/3048-1/
reference_id USN-3048-1
reference_type
scores
url https://usn.ubuntu.com/3048-1/
fixed_packages
aliases CVE-2016-5419
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7xxh-66ys-4bhw
7
url VCID-9qdr-1v39-d7b7
vulnerability_id VCID-9qdr-1v39-d7b7
summary When mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications. The severity is set to Moderate because "SessionEnv on" is not a default nor common configuration, it should be considered more severe when this is the case though, because of the possible remote exploitation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1283.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1283.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1283
reference_id
reference_type
scores
0
value 0.03348
scoring_system epss
scoring_elements 0.87263
published_at 2026-04-01T12:55:00Z
1
value 0.03348
scoring_system epss
scoring_elements 0.87316
published_at 2026-04-13T12:55:00Z
2
value 0.03348
scoring_system epss
scoring_elements 0.87313
published_at 2026-04-09T12:55:00Z
3
value 0.03348
scoring_system epss
scoring_elements 0.87326
published_at 2026-04-11T12:55:00Z
4
value 0.03348
scoring_system epss
scoring_elements 0.8732
published_at 2026-04-12T12:55:00Z
5
value 0.03348
scoring_system epss
scoring_elements 0.87273
published_at 2026-04-02T12:55:00Z
6
value 0.03348
scoring_system epss
scoring_elements 0.87289
published_at 2026-04-04T12:55:00Z
7
value 0.03348
scoring_system epss
scoring_elements 0.87287
published_at 2026-04-07T12:55:00Z
8
value 0.03348
scoring_system epss
scoring_elements 0.87306
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1283
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1560395
reference_id 1560395
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1560395
10
reference_url https://security.archlinux.org/ASA-201804-4
reference_id ASA-201804-4
reference_type
scores
url https://security.archlinux.org/ASA-201804-4
11
reference_url https://security.archlinux.org/AVG-664
reference_id AVG-664
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-664
12
reference_url https://httpd.apache.org/security/json/CVE-2018-1283.json
reference_id CVE-2018-1283
reference_type
scores
0
value moderate
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2018-1283.json
13
reference_url https://access.redhat.com/errata/RHSA-2019:0366
reference_id RHSA-2019:0366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0366
14
reference_url https://access.redhat.com/errata/RHSA-2019:0367
reference_id RHSA-2019:0367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0367
15
reference_url https://access.redhat.com/errata/RHSA-2020:3958
reference_id RHSA-2020:3958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3958
16
reference_url https://usn.ubuntu.com/3627-1/
reference_id USN-3627-1
reference_type
scores
url https://usn.ubuntu.com/3627-1/
17
reference_url https://usn.ubuntu.com/3627-2/
reference_id USN-3627-2
reference_type
scores
url https://usn.ubuntu.com/3627-2/
fixed_packages
aliases CVE-2018-1283
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9qdr-1v39-d7b7
8
url VCID-9vzm-qtye-ufh2
vulnerability_id VCID-9vzm-qtye-ufh2
summary By specially crafting HTTP/2 requests, workers would be allocated 60 seconds longer than necessary, leading to worker exhaustion and a denial of service. This issue only affects servers that have configured and enabled HTTP/2 support, which is not the default
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3558
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1333.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1333.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1333
reference_id
reference_type
scores
0
value 0.09859
scoring_system epss
scoring_elements 0.92958
published_at 2026-04-01T12:55:00Z
1
value 0.09859
scoring_system epss
scoring_elements 0.92987
published_at 2026-04-13T12:55:00Z
2
value 0.09859
scoring_system epss
scoring_elements 0.9297
published_at 2026-04-07T12:55:00Z
3
value 0.09859
scoring_system epss
scoring_elements 0.92978
published_at 2026-04-08T12:55:00Z
4
value 0.09859
scoring_system epss
scoring_elements 0.92983
published_at 2026-04-09T12:55:00Z
5
value 0.09859
scoring_system epss
scoring_elements 0.92988
published_at 2026-04-11T12:55:00Z
6
value 0.09859
scoring_system epss
scoring_elements 0.92986
published_at 2026-04-12T12:55:00Z
7
value 0.09859
scoring_system epss
scoring_elements 0.92967
published_at 2026-04-02T12:55:00Z
8
value 0.09859
scoring_system epss
scoring_elements 0.92971
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1333
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1333
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2018-1333
reference_id
reference_type
scores
url https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2018-1333
6
reference_url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
18
reference_url https://security.netapp.com/advisory/ntap-20180926-0007/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20180926-0007/
19
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
reference_id
reference_type
scores
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us
20
reference_url https://www.tenable.com/security/tns-2019-09
reference_id
reference_type
scores
url https://www.tenable.com/security/tns-2019-09
21
reference_url http://www.securitytracker.com/id/1041402
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1041402
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1605048
reference_id 1605048
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1605048
23
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904106
reference_id 904106
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904106
24
reference_url https://security.archlinux.org/ASA-201807-12
reference_id ASA-201807-12
reference_type
scores
url https://security.archlinux.org/ASA-201807-12
25
reference_url https://security.archlinux.org/AVG-736
reference_id AVG-736
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-736
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:apache:http_server:2.4.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.4.33:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_core_services:1.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
34
reference_url https://httpd.apache.org/security/json/CVE-2018-1333.json
reference_id CVE-2018-1333
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2018-1333.json
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1333
reference_id CVE-2018-1333
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2018-1333
36
reference_url https://access.redhat.com/errata/RHSA-2019:0366
reference_id RHSA-2019:0366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0366
37
reference_url https://access.redhat.com/errata/RHSA-2019:0367
reference_id RHSA-2019:0367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0367
38
reference_url https://usn.ubuntu.com/3783-1/
reference_id USN-3783-1
reference_type
scores
url https://usn.ubuntu.com/3783-1/
fixed_packages
aliases CVE-2018-1333
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9vzm-qtye-ufh2
9
url VCID-a3v7-ptf1-6qgd
vulnerability_id VCID-a3v7-ptf1-6qgd
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7141.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7141.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7141
reference_id
reference_type
scores
0
value 0.00524
scoring_system epss
scoring_elements 0.66857
published_at 2026-04-01T12:55:00Z
1
value 0.00524
scoring_system epss
scoring_elements 0.66895
published_at 2026-04-07T12:55:00Z
2
value 0.00524
scoring_system epss
scoring_elements 0.66921
published_at 2026-04-04T12:55:00Z
3
value 0.00524
scoring_system epss
scoring_elements 0.66943
published_at 2026-04-08T12:55:00Z
4
value 0.00524
scoring_system epss
scoring_elements 0.66957
published_at 2026-04-09T12:55:00Z
5
value 0.00524
scoring_system epss
scoring_elements 0.66977
published_at 2026-04-11T12:55:00Z
6
value 0.00524
scoring_system epss
scoring_elements 0.66963
published_at 2026-04-12T12:55:00Z
7
value 0.00524
scoring_system epss
scoring_elements 0.66932
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7141
2
reference_url https://curl.se/docs/CVE-2016-7141.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-7141.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7141
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7141
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1373229
reference_id 1373229
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1373229
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836918
reference_id 836918
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836918
6
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
7
reference_url https://access.redhat.com/errata/RHSA-2016:2575
reference_id RHSA-2016:2575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2575
8
reference_url https://access.redhat.com/errata/RHSA-2016:2957
reference_id RHSA-2016:2957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2957
9
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
aliases CVE-2016-7141
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a3v7-ptf1-6qgd
10
url VCID-ae59-w7a1-7keg
vulnerability_id VCID-ae59-w7a1-7keg
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:2486
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2486
1
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3558
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000254.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000254.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000254
reference_id
reference_type
scores
0
value 0.01178
scoring_system epss
scoring_elements 0.78727
published_at 2026-04-13T12:55:00Z
1
value 0.01178
scoring_system epss
scoring_elements 0.78736
published_at 2026-04-12T12:55:00Z
2
value 0.01348
scoring_system epss
scoring_elements 0.80043
published_at 2026-04-02T12:55:00Z
3
value 0.01348
scoring_system epss
scoring_elements 0.80081
published_at 2026-04-08T12:55:00Z
4
value 0.01348
scoring_system epss
scoring_elements 0.80053
published_at 2026-04-07T12:55:00Z
5
value 0.01348
scoring_system epss
scoring_elements 0.80064
published_at 2026-04-04T12:55:00Z
6
value 0.01348
scoring_system epss
scoring_elements 0.80036
published_at 2026-04-01T12:55:00Z
7
value 0.01348
scoring_system epss
scoring_elements 0.80109
published_at 2026-04-11T12:55:00Z
8
value 0.01348
scoring_system epss
scoring_elements 0.80089
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000254
4
reference_url https://curl.haxx.se/673d0cd8.patch
reference_id
reference_type
scores
url https://curl.haxx.se/673d0cd8.patch
5
reference_url https://curl.haxx.se/docs/adv_20171004.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_20171004.html
6
reference_url https://curl.se/docs/CVE-2017-1000254.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2017-1000254.html
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
13
reference_url https://support.apple.com/HT208331
reference_id
reference_type
scores
url https://support.apple.com/HT208331
14
reference_url http://www.debian.org/security/2017/dsa-3992
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3992
15
reference_url http://www.securityfocus.com/bid/101115
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101115
16
reference_url http://www.securitytracker.com/id/1039509
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039509
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1495541
reference_id 1495541
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1495541
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877671
reference_id 877671
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877671
19
reference_url https://security.archlinux.org/ASA-201710-2
reference_id ASA-201710-2
reference_type
scores
url https://security.archlinux.org/ASA-201710-2
20
reference_url https://security.archlinux.org/ASA-201710-3
reference_id ASA-201710-3
reference_type
scores
url https://security.archlinux.org/ASA-201710-3
21
reference_url https://security.archlinux.org/ASA-201710-4
reference_id ASA-201710-4
reference_type
scores
url https://security.archlinux.org/ASA-201710-4
22
reference_url https://security.archlinux.org/ASA-201710-5
reference_id ASA-201710-5
reference_type
scores
url https://security.archlinux.org/ASA-201710-5
23
reference_url https://security.archlinux.org/ASA-201710-6
reference_id ASA-201710-6
reference_type
scores
url https://security.archlinux.org/ASA-201710-6
24
reference_url https://security.archlinux.org/ASA-201710-7
reference_id ASA-201710-7
reference_type
scores
url https://security.archlinux.org/ASA-201710-7
25
reference_url https://security.archlinux.org/AVG-371
reference_id AVG-371
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-371
26
reference_url https://security.archlinux.org/AVG-386
reference_id AVG-386
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-386
27
reference_url https://security.archlinux.org/AVG-387
reference_id AVG-387
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-387
28
reference_url https://security.archlinux.org/AVG-388
reference_id AVG-388
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-388
29
reference_url https://security.archlinux.org/AVG-389
reference_id AVG-389
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-389
30
reference_url https://security.archlinux.org/AVG-422
reference_id AVG-422
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-422
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.55.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.0:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.55.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.1:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*
138
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*
139
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*
140
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*
141
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*
142
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*
143
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*
144
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*
145
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*
146
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*
147
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*
148
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000254
reference_id CVE-2017-1000254
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000254
149
reference_url https://security.gentoo.org/glsa/201712-04
reference_id GLSA-201712-04
reference_type
scores
url https://security.gentoo.org/glsa/201712-04
150
reference_url https://usn.ubuntu.com/3441-1/
reference_id USN-3441-1
reference_type
scores
url https://usn.ubuntu.com/3441-1/
151
reference_url https://usn.ubuntu.com/3441-2/
reference_id USN-3441-2
reference_type
scores
url https://usn.ubuntu.com/3441-2/
fixed_packages
aliases CVE-2017-1000254
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ae59-w7a1-7keg
11
url VCID-bgtv-jrna-9yb3
vulnerability_id VCID-bgtv-jrna-9yb3
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5421.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5421.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5421
reference_id
reference_type
scores
0
value 0.01296
scoring_system epss
scoring_elements 0.79647
published_at 2026-04-01T12:55:00Z
1
value 0.01296
scoring_system epss
scoring_elements 0.79695
published_at 2026-04-13T12:55:00Z
2
value 0.01296
scoring_system epss
scoring_elements 0.79718
published_at 2026-04-11T12:55:00Z
3
value 0.01296
scoring_system epss
scoring_elements 0.79702
published_at 2026-04-12T12:55:00Z
4
value 0.01296
scoring_system epss
scoring_elements 0.79653
published_at 2026-04-02T12:55:00Z
5
value 0.01296
scoring_system epss
scoring_elements 0.79675
published_at 2026-04-04T12:55:00Z
6
value 0.01296
scoring_system epss
scoring_elements 0.79661
published_at 2026-04-07T12:55:00Z
7
value 0.01296
scoring_system epss
scoring_elements 0.7969
published_at 2026-04-08T12:55:00Z
8
value 0.01296
scoring_system epss
scoring_elements 0.79697
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5421
2
reference_url https://curl.se/docs/CVE-2016-5421.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-5421.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1362199
reference_id 1362199
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1362199
8
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
9
reference_url https://usn.ubuntu.com/3048-1/
reference_id USN-3048-1
reference_type
scores
url https://usn.ubuntu.com/3048-1/
fixed_packages
aliases CVE-2016-5421
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bgtv-jrna-9yb3
12
url VCID-bhvd-ntxz-dkg4
vulnerability_id VCID-bhvd-ntxz-dkg4
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3558
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8816.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8816.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8816
reference_id
reference_type
scores
0
value 0.00454
scoring_system epss
scoring_elements 0.63733
published_at 2026-04-01T12:55:00Z
1
value 0.00454
scoring_system epss
scoring_elements 0.63812
published_at 2026-04-13T12:55:00Z
2
value 0.00454
scoring_system epss
scoring_elements 0.63794
published_at 2026-04-02T12:55:00Z
3
value 0.00454
scoring_system epss
scoring_elements 0.63821
published_at 2026-04-04T12:55:00Z
4
value 0.00454
scoring_system epss
scoring_elements 0.63778
published_at 2026-04-07T12:55:00Z
5
value 0.00454
scoring_system epss
scoring_elements 0.63829
published_at 2026-04-08T12:55:00Z
6
value 0.00454
scoring_system epss
scoring_elements 0.63846
published_at 2026-04-12T12:55:00Z
7
value 0.00454
scoring_system epss
scoring_elements 0.6386
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8816
3
reference_url https://curl.haxx.se/docs/adv_2017-12e7.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_2017-12e7.html
4
reference_url https://curl.se/docs/CVE-2017-8816.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2017-8816.html
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8816
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817
7
reference_url http://security.cucumberlinux.com/security/details.php?id=161
reference_id
reference_type
scores
url http://security.cucumberlinux.com/security/details.php?id=161
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://www.debian.org/security/2017/dsa-4051
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4051
10
reference_url http://www.securityfocus.com/bid/101998
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101998
11
reference_url http://www.securitytracker.com/id/1039896
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039896
12
reference_url http://www.securitytracker.com/id/1040608
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1040608
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1515757
reference_id 1515757
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1515757
14
reference_url https://security.archlinux.org/ASA-201711-36
reference_id ASA-201711-36
reference_type
scores
url https://security.archlinux.org/ASA-201711-36
15
reference_url https://security.archlinux.org/ASA-201711-37
reference_id ASA-201711-37
reference_type
scores
url https://security.archlinux.org/ASA-201711-37
16
reference_url https://security.archlinux.org/ASA-201711-38
reference_id ASA-201711-38
reference_type
scores
url https://security.archlinux.org/ASA-201711-38
17
reference_url https://security.archlinux.org/AVG-521
reference_id AVG-521
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-521
18
reference_url https://security.archlinux.org/AVG-522
reference_id AVG-522
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-522
19
reference_url https://security.archlinux.org/AVG-523
reference_id AVG-523
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-523
20
reference_url https://security.archlinux.org/AVG-527
reference_id AVG-527
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-527
21
reference_url https://security.archlinux.org/AVG-528
reference_id AVG-528
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-528
22
reference_url https://security.archlinux.org/AVG-529
reference_id AVG-529
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-529
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8816
reference_id CVE-2017-8816
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8816
28
reference_url https://security.gentoo.org/glsa/201712-04
reference_id GLSA-201712-04
reference_type
scores
url https://security.gentoo.org/glsa/201712-04
29
reference_url https://usn.ubuntu.com/3498-1/
reference_id USN-3498-1
reference_type
scores
url https://usn.ubuntu.com/3498-1/
fixed_packages
aliases CVE-2017-8816
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bhvd-ntxz-dkg4
13
url VCID-bv57-gvfs-qfhj
vulnerability_id VCID-bv57-gvfs-qfhj
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000121.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000121.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000121
reference_id
reference_type
scores
0
value 0.03154
scoring_system epss
scoring_elements 0.86848
published_at 2026-04-01T12:55:00Z
1
value 0.03154
scoring_system epss
scoring_elements 0.86902
published_at 2026-04-13T12:55:00Z
2
value 0.03154
scoring_system epss
scoring_elements 0.86858
published_at 2026-04-02T12:55:00Z
3
value 0.03154
scoring_system epss
scoring_elements 0.86877
published_at 2026-04-04T12:55:00Z
4
value 0.03154
scoring_system epss
scoring_elements 0.86872
published_at 2026-04-07T12:55:00Z
5
value 0.03154
scoring_system epss
scoring_elements 0.86891
published_at 2026-04-08T12:55:00Z
6
value 0.03154
scoring_system epss
scoring_elements 0.869
published_at 2026-04-09T12:55:00Z
7
value 0.03154
scoring_system epss
scoring_elements 0.86913
published_at 2026-04-11T12:55:00Z
8
value 0.03154
scoring_system epss
scoring_elements 0.86908
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000121
2
reference_url https://curl.se/docs/CVE-2018-1000121.html
reference_id
reference_type
scores
0
value Low
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-1000121.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1552631
reference_id 1552631
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1552631
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546
reference_id 893546
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546
9
reference_url https://security.archlinux.org/ASA-201803-15
reference_id ASA-201803-15
reference_type
scores
url https://security.archlinux.org/ASA-201803-15
10
reference_url https://security.archlinux.org/ASA-201803-16
reference_id ASA-201803-16
reference_type
scores
url https://security.archlinux.org/ASA-201803-16
11
reference_url https://security.archlinux.org/ASA-201803-17
reference_id ASA-201803-17
reference_type
scores
url https://security.archlinux.org/ASA-201803-17
12
reference_url https://security.archlinux.org/ASA-201803-18
reference_id ASA-201803-18
reference_type
scores
url https://security.archlinux.org/ASA-201803-18
13
reference_url https://security.archlinux.org/ASA-201803-19
reference_id ASA-201803-19
reference_type
scores
url https://security.archlinux.org/ASA-201803-19
14
reference_url https://security.archlinux.org/ASA-201803-20
reference_id ASA-201803-20
reference_type
scores
url https://security.archlinux.org/ASA-201803-20
15
reference_url https://security.archlinux.org/AVG-653
reference_id AVG-653
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-653
16
reference_url https://security.archlinux.org/AVG-654
reference_id AVG-654
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-654
17
reference_url https://security.archlinux.org/AVG-655
reference_id AVG-655
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-655
18
reference_url https://security.archlinux.org/AVG-656
reference_id AVG-656
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-656
19
reference_url https://security.archlinux.org/AVG-660
reference_id AVG-660
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-660
20
reference_url https://security.archlinux.org/AVG-661
reference_id AVG-661
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-661
21
reference_url https://security.gentoo.org/glsa/201804-04
reference_id GLSA-201804-04
reference_type
scores
url https://security.gentoo.org/glsa/201804-04
fixed_packages
aliases CVE-2018-1000121
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bv57-gvfs-qfhj
14
url VCID-c6dk-7gj6-7far
vulnerability_id VCID-c6dk-7gj6-7far
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8623.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8623.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8623
reference_id
reference_type
scores
0
value 0.00837
scoring_system epss
scoring_elements 0.74617
published_at 2026-04-01T12:55:00Z
1
value 0.00837
scoring_system epss
scoring_elements 0.74662
published_at 2026-04-13T12:55:00Z
2
value 0.00837
scoring_system epss
scoring_elements 0.74621
published_at 2026-04-07T12:55:00Z
3
value 0.00837
scoring_system epss
scoring_elements 0.74647
published_at 2026-04-04T12:55:00Z
4
value 0.00837
scoring_system epss
scoring_elements 0.74653
published_at 2026-04-08T12:55:00Z
5
value 0.00837
scoring_system epss
scoring_elements 0.74667
published_at 2026-04-09T12:55:00Z
6
value 0.00837
scoring_system epss
scoring_elements 0.7469
published_at 2026-04-11T12:55:00Z
7
value 0.00837
scoring_system epss
scoring_elements 0.7467
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8623
2
reference_url https://curl.se/docs/CVE-2016-8623.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8623.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388388
reference_id 1388388
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388388
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
20
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
21
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
22
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
23
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
24
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
25
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
26
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
27
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
28
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
aliases CVE-2016-8623
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c6dk-7gj6-7far
15
url VCID-cbph-fu9d-gbah
vulnerability_id VCID-cbph-fu9d-gbah
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000122.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000122.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000122
reference_id
reference_type
scores
0
value 0.01942
scoring_system epss
scoring_elements 0.83368
published_at 2026-04-01T12:55:00Z
1
value 0.01942
scoring_system epss
scoring_elements 0.83435
published_at 2026-04-13T12:55:00Z
2
value 0.01942
scoring_system epss
scoring_elements 0.83381
published_at 2026-04-02T12:55:00Z
3
value 0.01942
scoring_system epss
scoring_elements 0.83396
published_at 2026-04-07T12:55:00Z
4
value 0.01942
scoring_system epss
scoring_elements 0.8342
published_at 2026-04-08T12:55:00Z
5
value 0.01942
scoring_system epss
scoring_elements 0.8343
published_at 2026-04-09T12:55:00Z
6
value 0.01942
scoring_system epss
scoring_elements 0.83445
published_at 2026-04-11T12:55:00Z
7
value 0.01942
scoring_system epss
scoring_elements 0.83439
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000122
2
reference_url https://curl.se/docs/CVE-2018-1000122.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-1000122.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1553398
reference_id 1553398
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1553398
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546
reference_id 893546
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546
9
reference_url https://security.archlinux.org/ASA-201803-15
reference_id ASA-201803-15
reference_type
scores
url https://security.archlinux.org/ASA-201803-15
10
reference_url https://security.archlinux.org/ASA-201803-16
reference_id ASA-201803-16
reference_type
scores
url https://security.archlinux.org/ASA-201803-16
11
reference_url https://security.archlinux.org/ASA-201803-17
reference_id ASA-201803-17
reference_type
scores
url https://security.archlinux.org/ASA-201803-17
12
reference_url https://security.archlinux.org/ASA-201803-18
reference_id ASA-201803-18
reference_type
scores
url https://security.archlinux.org/ASA-201803-18
13
reference_url https://security.archlinux.org/ASA-201803-19
reference_id ASA-201803-19
reference_type
scores
url https://security.archlinux.org/ASA-201803-19
14
reference_url https://security.archlinux.org/ASA-201803-20
reference_id ASA-201803-20
reference_type
scores
url https://security.archlinux.org/ASA-201803-20
15
reference_url https://security.archlinux.org/AVG-653
reference_id AVG-653
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-653
16
reference_url https://security.archlinux.org/AVG-654
reference_id AVG-654
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-654
17
reference_url https://security.archlinux.org/AVG-655
reference_id AVG-655
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-655
18
reference_url https://security.archlinux.org/AVG-656
reference_id AVG-656
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-656
19
reference_url https://security.archlinux.org/AVG-660
reference_id AVG-660
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-660
20
reference_url https://security.archlinux.org/AVG-661
reference_id AVG-661
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-661
21
reference_url https://security.gentoo.org/glsa/201804-04
reference_id GLSA-201804-04
reference_type
scores
url https://security.gentoo.org/glsa/201804-04
fixed_packages
aliases CVE-2018-1000122
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cbph-fu9d-gbah
16
url VCID-dgtq-eaav-jyhf
vulnerability_id VCID-dgtq-eaav-jyhf
summary
Out-of-bounds Write
A buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that allows an attacker to cause a denial of service or worse.
references
0
reference_url https://access.redhat.com/errata/RHBA-2019:0327
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHBA-2019:0327
1
reference_url https://access.redhat.com/errata/RHSA-2018:3157
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:3157
2
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:3558
3
reference_url https://access.redhat.com/errata/RHSA-2019:1543
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2019:1543
4
reference_url https://access.redhat.com/errata/RHSA-2020:0544
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0544
5
reference_url https://access.redhat.com/errata/RHSA-2020:0594
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2020:0594
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000120.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000120.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000120
reference_id
reference_type
scores
0
value 0.0154
scoring_system epss
scoring_elements 0.81334
published_at 2026-04-04T12:55:00Z
1
value 0.0154
scoring_system epss
scoring_elements 0.81332
published_at 2026-04-07T12:55:00Z
2
value 0.0154
scoring_system epss
scoring_elements 0.81361
published_at 2026-04-08T12:55:00Z
3
value 0.0154
scoring_system epss
scoring_elements 0.81366
published_at 2026-04-09T12:55:00Z
4
value 0.0154
scoring_system epss
scoring_elements 0.81387
published_at 2026-04-11T12:55:00Z
5
value 0.0154
scoring_system epss
scoring_elements 0.81372
published_at 2026-04-12T12:55:00Z
6
value 0.0154
scoring_system epss
scoring_elements 0.81365
published_at 2026-04-13T12:55:00Z
7
value 0.0154
scoring_system epss
scoring_elements 0.81302
published_at 2026-04-01T12:55:00Z
8
value 0.0154
scoring_system epss
scoring_elements 0.81312
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000120
8
reference_url https://curl.haxx.se/docs/adv_2018-9cd6.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://curl.haxx.se/docs/adv_2018-9cd6.html
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://github.com/coapp-packages/curl
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/coapp-packages/curl
14
reference_url https://lists.debian.org/debian-lts-announce/2018/03/msg00012.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2018/03/msg00012.html
15
reference_url https://usn.ubuntu.com/3598-1
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/3598-1
16
reference_url https://usn.ubuntu.com/3598-1/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3598-1/
17
reference_url https://usn.ubuntu.com/3598-2
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/3598-2
18
reference_url https://usn.ubuntu.com/3598-2/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3598-2/
19
reference_url https://web.archive.org/web/20201220134105/http://www.securitytracker.com/id/1040531
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20201220134105/http://www.securitytracker.com/id/1040531
20
reference_url https://web.archive.org/web/20201220134609/http://www.securityfocus.com/bid/103414
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20201220134609/http://www.securityfocus.com/bid/103414
21
reference_url https://www.debian.org/security/2018/dsa-4136
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2018/dsa-4136
22
reference_url https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
23
reference_url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
24
reference_url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
25
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
26
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1552628
reference_id 1552628
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1552628
28
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546
reference_id 893546
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546
29
reference_url https://security.archlinux.org/ASA-201803-15
reference_id ASA-201803-15
reference_type
scores
url https://security.archlinux.org/ASA-201803-15
30
reference_url https://security.archlinux.org/ASA-201803-16
reference_id ASA-201803-16
reference_type
scores
url https://security.archlinux.org/ASA-201803-16
31
reference_url https://security.archlinux.org/ASA-201803-17
reference_id ASA-201803-17
reference_type
scores
url https://security.archlinux.org/ASA-201803-17
32
reference_url https://security.archlinux.org/ASA-201803-18
reference_id ASA-201803-18
reference_type
scores
url https://security.archlinux.org/ASA-201803-18
33
reference_url https://security.archlinux.org/ASA-201803-19
reference_id ASA-201803-19
reference_type
scores
url https://security.archlinux.org/ASA-201803-19
34
reference_url https://security.archlinux.org/ASA-201803-20
reference_id ASA-201803-20
reference_type
scores
url https://security.archlinux.org/ASA-201803-20
35
reference_url https://security.archlinux.org/AVG-653
reference_id AVG-653
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-653
36
reference_url https://security.archlinux.org/AVG-654
reference_id AVG-654
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-654
37
reference_url https://security.archlinux.org/AVG-655
reference_id AVG-655
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-655
38
reference_url https://security.archlinux.org/AVG-656
reference_id AVG-656
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-656
39
reference_url https://security.archlinux.org/AVG-660
reference_id AVG-660
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-660
40
reference_url https://security.archlinux.org/AVG-661
reference_id AVG-661
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-661
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1000120
reference_id CVE-2018-1000120
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-1000120
42
reference_url https://curl.se/docs/CVE-2018-1000120.html
reference_id CVE-2018-1000120.HTML
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value High
scoring_system cvssv3.1
scoring_elements
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://curl.se/docs/CVE-2018-1000120.html
43
reference_url https://github.com/advisories/GHSA-674j-7m97-j2p9
reference_id GHSA-674j-7m97-j2p9
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-674j-7m97-j2p9
44
reference_url https://security.gentoo.org/glsa/201804-04
reference_id GLSA-201804-04
reference_type
scores
url https://security.gentoo.org/glsa/201804-04
fixed_packages
aliases CVE-2018-1000120, GHSA-674j-7m97-j2p9
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dgtq-eaav-jyhf
17
url VCID-e3jc-83a7-8uhh
vulnerability_id VCID-e3jc-83a7-8uhh
summary By sending continous SETTINGS frames of maximum size an ongoing HTTP/2 connection could be kept busy and would never time out. This can be abused for a DoS on the server. This only affect a server that has enabled the h2 protocol.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11763.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11763.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-11763
reference_id
reference_type
scores
0
value 0.17401
scoring_system epss
scoring_elements 0.95033
published_at 2026-04-01T12:55:00Z
1
value 0.17401
scoring_system epss
scoring_elements 0.95068
published_at 2026-04-13T12:55:00Z
2
value 0.17401
scoring_system epss
scoring_elements 0.95064
published_at 2026-04-11T12:55:00Z
3
value 0.17401
scoring_system epss
scoring_elements 0.95065
published_at 2026-04-12T12:55:00Z
4
value 0.17401
scoring_system epss
scoring_elements 0.95044
published_at 2026-04-02T12:55:00Z
5
value 0.17401
scoring_system epss
scoring_elements 0.95045
published_at 2026-04-04T12:55:00Z
6
value 0.17401
scoring_system epss
scoring_elements 0.95047
published_at 2026-04-07T12:55:00Z
7
value 0.17401
scoring_system epss
scoring_elements 0.95055
published_at 2026-04-08T12:55:00Z
8
value 0.17401
scoring_system epss
scoring_elements 0.95058
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-11763
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11763
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1633399
reference_id 1633399
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1633399
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909591
reference_id 909591
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=909591
6
reference_url https://httpd.apache.org/security/json/CVE-2018-11763.json
reference_id CVE-2018-11763
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2018-11763.json
7
reference_url https://access.redhat.com/errata/RHSA-2019:0366
reference_id RHSA-2019:0366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0366
8
reference_url https://access.redhat.com/errata/RHSA-2019:0367
reference_id RHSA-2019:0367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0367
9
reference_url https://usn.ubuntu.com/3783-1/
reference_id USN-3783-1
reference_type
scores
url https://usn.ubuntu.com/3783-1/
fixed_packages
aliases CVE-2018-11763
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e3jc-83a7-8uhh
18
url VCID-e58m-g37d-9fd6
vulnerability_id VCID-e58m-g37d-9fd6
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8624.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8624
reference_id
reference_type
scores
0
value 0.01346
scoring_system epss
scoring_elements 0.80023
published_at 2026-04-01T12:55:00Z
1
value 0.01346
scoring_system epss
scoring_elements 0.80073
published_at 2026-04-13T12:55:00Z
2
value 0.01346
scoring_system epss
scoring_elements 0.8003
published_at 2026-04-02T12:55:00Z
3
value 0.01346
scoring_system epss
scoring_elements 0.80052
published_at 2026-04-04T12:55:00Z
4
value 0.01346
scoring_system epss
scoring_elements 0.80042
published_at 2026-04-07T12:55:00Z
5
value 0.01346
scoring_system epss
scoring_elements 0.80069
published_at 2026-04-08T12:55:00Z
6
value 0.01346
scoring_system epss
scoring_elements 0.80078
published_at 2026-04-09T12:55:00Z
7
value 0.01346
scoring_system epss
scoring_elements 0.80098
published_at 2026-04-11T12:55:00Z
8
value 0.01346
scoring_system epss
scoring_elements 0.80082
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8624
2
reference_url https://curl.se/docs/CVE-2016-8624.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8624.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388390
reference_id 1388390
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388390
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
20
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
21
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
22
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
23
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
24
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
25
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
26
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
27
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
28
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
aliases CVE-2016-8624
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e58m-g37d-9fd6
19
url VCID-fnj3-2du1-4bhx
vulnerability_id VCID-fnj3-2du1-4bhx
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3558
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9586.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9586.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9586
reference_id
reference_type
scores
0
value 0.00891
scoring_system epss
scoring_elements 0.75492
published_at 2026-04-01T12:55:00Z
1
value 0.00891
scoring_system epss
scoring_elements 0.75578
published_at 2026-04-11T12:55:00Z
2
value 0.00891
scoring_system epss
scoring_elements 0.75494
published_at 2026-04-02T12:55:00Z
3
value 0.00891
scoring_system epss
scoring_elements 0.75525
published_at 2026-04-04T12:55:00Z
4
value 0.00891
scoring_system epss
scoring_elements 0.75506
published_at 2026-04-07T12:55:00Z
5
value 0.00891
scoring_system epss
scoring_elements 0.75548
published_at 2026-04-13T12:55:00Z
6
value 0.00891
scoring_system epss
scoring_elements 0.75557
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9586
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586
4
reference_url https://curl.haxx.se/docs/adv_20161221A.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_20161221A.html
5
reference_url https://curl.se/docs/CVE-2016-9586.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-9586.html
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.2
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16
reference_id
reference_type
scores
url https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16
9
reference_url https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
11
reference_url https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html
12
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
13
reference_url http://www.securityfocus.com/bid/95019
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95019
14
reference_url http://www.securitytracker.com/id/1037515
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1037515
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1406712
reference_id 1406712
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1406712
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848958
reference_id 848958
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848958
17
reference_url https://security.archlinux.org/ASA-201612-22
reference_id ASA-201612-22
reference_type
scores
url https://security.archlinux.org/ASA-201612-22
18
reference_url https://security.archlinux.org/ASA-201701-10
reference_id ASA-201701-10
reference_type
scores
url https://security.archlinux.org/ASA-201701-10
19
reference_url https://security.archlinux.org/ASA-201701-11
reference_id ASA-201701-11
reference_type
scores
url https://security.archlinux.org/ASA-201701-11
20
reference_url https://security.archlinux.org/ASA-201701-7
reference_id ASA-201701-7
reference_type
scores
url https://security.archlinux.org/ASA-201701-7
21
reference_url https://security.archlinux.org/ASA-201701-8
reference_id ASA-201701-8
reference_type
scores
url https://security.archlinux.org/ASA-201701-8
22
reference_url https://security.archlinux.org/ASA-201701-9
reference_id ASA-201701-9
reference_type
scores
url https://security.archlinux.org/ASA-201701-9
23
reference_url https://security.archlinux.org/AVG-112
reference_id AVG-112
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-112
24
reference_url https://security.archlinux.org/AVG-113
reference_id AVG-113
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-113
25
reference_url https://security.archlinux.org/AVG-114
reference_id AVG-114
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-114
26
reference_url https://security.archlinux.org/AVG-115
reference_id AVG-115
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-115
27
reference_url https://security.archlinux.org/AVG-116
reference_id AVG-116
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-116
28
reference_url https://security.archlinux.org/AVG-117
reference_id AVG-117
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-117
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-9586
reference_id CVE-2016-9586
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-9586
31
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
32
reference_url https://usn.ubuntu.com/3441-1/
reference_id USN-3441-1
reference_type
scores
url https://usn.ubuntu.com/3441-1/
33
reference_url https://usn.ubuntu.com/3441-2/
reference_id USN-3441-2
reference_type
scores
url https://usn.ubuntu.com/3441-2/
fixed_packages
aliases CVE-2016-9586
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fnj3-2du1-4bhx
20
url VCID-fp65-97n1-xuaj
vulnerability_id VCID-fp65-97n1-xuaj
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may allow attackers to bypass intended restrictions.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3558
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000100.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000100.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000100
reference_id
reference_type
scores
0
value 0.00962
scoring_system epss
scoring_elements 0.76442
published_at 2026-04-01T12:55:00Z
1
value 0.00962
scoring_system epss
scoring_elements 0.765
published_at 2026-04-13T12:55:00Z
2
value 0.00962
scoring_system epss
scoring_elements 0.76447
published_at 2026-04-02T12:55:00Z
3
value 0.00962
scoring_system epss
scoring_elements 0.76475
published_at 2026-04-04T12:55:00Z
4
value 0.00962
scoring_system epss
scoring_elements 0.76457
published_at 2026-04-07T12:55:00Z
5
value 0.00962
scoring_system epss
scoring_elements 0.76489
published_at 2026-04-08T12:55:00Z
6
value 0.00962
scoring_system epss
scoring_elements 0.76501
published_at 2026-04-09T12:55:00Z
7
value 0.00962
scoring_system epss
scoring_elements 0.76527
published_at 2026-04-11T12:55:00Z
8
value 0.00962
scoring_system epss
scoring_elements 0.76506
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000100
3
reference_url https://curl.haxx.se/docs/adv_20170809B.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_20170809B.html
4
reference_url https://curl.se/docs/CVE-2017-1000100.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2017-1000100.html
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.5
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:P/I:N/A:N
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://support.apple.com/HT208221
reference_id
reference_type
scores
url https://support.apple.com/HT208221
10
reference_url http://www.debian.org/security/2017/dsa-3992
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3992
11
reference_url http://www.securityfocus.com/bid/100286
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/100286
12
reference_url http://www.securitytracker.com/id/1039118
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039118
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1478310
reference_id 1478310
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1478310
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871555
reference_id 871555
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871555
15
reference_url https://security.archlinux.org/ASA-201708-16
reference_id ASA-201708-16
reference_type
scores
url https://security.archlinux.org/ASA-201708-16
16
reference_url https://security.archlinux.org/ASA-201710-3
reference_id ASA-201710-3
reference_type
scores
url https://security.archlinux.org/ASA-201710-3
17
reference_url https://security.archlinux.org/ASA-201710-4
reference_id ASA-201710-4
reference_type
scores
url https://security.archlinux.org/ASA-201710-4
18
reference_url https://security.archlinux.org/ASA-201710-5
reference_id ASA-201710-5
reference_type
scores
url https://security.archlinux.org/ASA-201710-5
19
reference_url https://security.archlinux.org/ASA-201710-6
reference_id ASA-201710-6
reference_type
scores
url https://security.archlinux.org/ASA-201710-6
20
reference_url https://security.archlinux.org/ASA-201710-7
reference_id ASA-201710-7
reference_type
scores
url https://security.archlinux.org/ASA-201710-7
21
reference_url https://security.archlinux.org/AVG-370
reference_id AVG-370
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-370
22
reference_url https://security.archlinux.org/AVG-371
reference_id AVG-371
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-371
23
reference_url https://security.archlinux.org/AVG-386
reference_id AVG-386
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-386
24
reference_url https://security.archlinux.org/AVG-387
reference_id AVG-387
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-387
25
reference_url https://security.archlinux.org/AVG-388
reference_id AVG-388
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-388
26
reference_url https://security.archlinux.org/AVG-389
reference_id AVG-389
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-389
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000100
reference_id CVE-2017-1000100
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000100
107
reference_url https://security.gentoo.org/glsa/201709-14
reference_id GLSA-201709-14
reference_type
scores
url https://security.gentoo.org/glsa/201709-14
108
reference_url https://usn.ubuntu.com/3441-1/
reference_id USN-3441-1
reference_type
scores
url https://usn.ubuntu.com/3441-1/
109
reference_url https://usn.ubuntu.com/3441-2/
reference_id USN-3441-2
reference_type
scores
url https://usn.ubuntu.com/3441-2/
fixed_packages
aliases CVE-2017-1000100
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fp65-97n1-xuaj
21
url VCID-fqem-96w3-rucb
vulnerability_id VCID-fqem-96w3-rucb
summary When generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1312.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1312.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1312
reference_id
reference_type
scores
0
value 0.0728
scoring_system epss
scoring_elements 0.91622
published_at 2026-04-01T12:55:00Z
1
value 0.0728
scoring_system epss
scoring_elements 0.91663
published_at 2026-04-13T12:55:00Z
2
value 0.0728
scoring_system epss
scoring_elements 0.91661
published_at 2026-04-09T12:55:00Z
3
value 0.0728
scoring_system epss
scoring_elements 0.91664
published_at 2026-04-11T12:55:00Z
4
value 0.0728
scoring_system epss
scoring_elements 0.91667
published_at 2026-04-12T12:55:00Z
5
value 0.0728
scoring_system epss
scoring_elements 0.91629
published_at 2026-04-02T12:55:00Z
6
value 0.0728
scoring_system epss
scoring_elements 0.91634
published_at 2026-04-04T12:55:00Z
7
value 0.0728
scoring_system epss
scoring_elements 0.91642
published_at 2026-04-07T12:55:00Z
8
value 0.0728
scoring_system epss
scoring_elements 0.91655
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1560634
reference_id 1560634
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1560634
10
reference_url https://security.archlinux.org/ASA-201804-4
reference_id ASA-201804-4
reference_type
scores
url https://security.archlinux.org/ASA-201804-4
11
reference_url https://security.archlinux.org/AVG-664
reference_id AVG-664
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-664
12
reference_url https://httpd.apache.org/security/json/CVE-2018-1312.json
reference_id CVE-2018-1312
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2018-1312.json
13
reference_url https://access.redhat.com/errata/RHSA-2019:0366
reference_id RHSA-2019:0366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0366
14
reference_url https://access.redhat.com/errata/RHSA-2019:0367
reference_id RHSA-2019:0367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0367
15
reference_url https://access.redhat.com/errata/RHSA-2019:1898
reference_id RHSA-2019:1898
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1898
16
reference_url https://usn.ubuntu.com/3627-1/
reference_id USN-3627-1
reference_type
scores
url https://usn.ubuntu.com/3627-1/
17
reference_url https://usn.ubuntu.com/3627-2/
reference_id USN-3627-2
reference_type
scores
url https://usn.ubuntu.com/3627-2/
18
reference_url https://usn.ubuntu.com/3937-2/
reference_id USN-3937-2
reference_type
scores
url https://usn.ubuntu.com/3937-2/
fixed_packages
aliases CVE-2018-1312
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fqem-96w3-rucb
22
url VCID-j2cq-q3r9-jfcp
vulnerability_id VCID-j2cq-q3r9-jfcp
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8620.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8620.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8620
reference_id
reference_type
scores
0
value 0.00816
scoring_system epss
scoring_elements 0.74253
published_at 2026-04-01T12:55:00Z
1
value 0.00816
scoring_system epss
scoring_elements 0.74298
published_at 2026-04-13T12:55:00Z
2
value 0.00816
scoring_system epss
scoring_elements 0.74305
published_at 2026-04-09T12:55:00Z
3
value 0.00816
scoring_system epss
scoring_elements 0.74326
published_at 2026-04-11T12:55:00Z
4
value 0.00816
scoring_system epss
scoring_elements 0.74306
published_at 2026-04-12T12:55:00Z
5
value 0.00816
scoring_system epss
scoring_elements 0.74258
published_at 2026-04-07T12:55:00Z
6
value 0.00816
scoring_system epss
scoring_elements 0.74284
published_at 2026-04-04T12:55:00Z
7
value 0.00816
scoring_system epss
scoring_elements 0.7429
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8620
2
reference_url https://curl.se/docs/CVE-2016-8620.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8620.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388382
reference_id 1388382
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388382
15
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
16
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
17
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
18
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
aliases CVE-2016-8620
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j2cq-q3r9-jfcp
23
url VCID-j2qx-np45-4qdu
vulnerability_id VCID-j2qx-np45-4qdu
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:2486
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2486
1
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3558
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000257.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000257.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000257
reference_id
reference_type
scores
0
value 0.01001
scoring_system epss
scoring_elements 0.76991
published_at 2026-04-13T12:55:00Z
1
value 0.01001
scoring_system epss
scoring_elements 0.77017
published_at 2026-04-11T12:55:00Z
2
value 0.01001
scoring_system epss
scoring_elements 0.76996
published_at 2026-04-12T12:55:00Z
3
value 0.0109
scoring_system epss
scoring_elements 0.77876
published_at 2026-04-01T12:55:00Z
4
value 0.01419
scoring_system epss
scoring_elements 0.80531
published_at 2026-04-02T12:55:00Z
5
value 0.01419
scoring_system epss
scoring_elements 0.80584
published_at 2026-04-09T12:55:00Z
6
value 0.01419
scoring_system epss
scoring_elements 0.80574
published_at 2026-04-08T12:55:00Z
7
value 0.01419
scoring_system epss
scoring_elements 0.80545
published_at 2026-04-07T12:55:00Z
8
value 0.01419
scoring_system epss
scoring_elements 0.80553
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000257
4
reference_url https://curl.haxx.se/docs/adv_20171023.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_20171023.html
5
reference_url https://curl.se/docs/CVE-2017-1000257.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2017-1000257.html
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000257
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:P
1
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url http://www.debian.org/security/2017/dsa-4007
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-4007
9
reference_url http://www.securityfocus.com/bid/101519
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101519
10
reference_url http://www.securitytracker.com/id/1039644
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039644
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1503705
reference_id 1503705
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1503705
12
reference_url https://security.archlinux.org/ASA-201711-10
reference_id ASA-201711-10
reference_type
scores
url https://security.archlinux.org/ASA-201711-10
13
reference_url https://security.archlinux.org/ASA-201711-11
reference_id ASA-201711-11
reference_type
scores
url https://security.archlinux.org/ASA-201711-11
14
reference_url https://security.archlinux.org/ASA-201711-6
reference_id ASA-201711-6
reference_type
scores
url https://security.archlinux.org/ASA-201711-6
15
reference_url https://security.archlinux.org/ASA-201711-7
reference_id ASA-201711-7
reference_type
scores
url https://security.archlinux.org/ASA-201711-7
16
reference_url https://security.archlinux.org/ASA-201711-8
reference_id ASA-201711-8
reference_type
scores
url https://security.archlinux.org/ASA-201711-8
17
reference_url https://security.archlinux.org/ASA-201711-9
reference_id ASA-201711-9
reference_type
scores
url https://security.archlinux.org/ASA-201711-9
18
reference_url https://security.archlinux.org/AVG-462
reference_id AVG-462
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-462
19
reference_url https://security.archlinux.org/AVG-463
reference_id AVG-463
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-463
20
reference_url https://security.archlinux.org/AVG-464
reference_id AVG-464
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-464
21
reference_url https://security.archlinux.org/AVG-465
reference_id AVG-465
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-465
22
reference_url https://security.archlinux.org/AVG-466
reference_id AVG-466
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-466
23
reference_url https://security.archlinux.org/AVG-467
reference_id AVG-467
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-467
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000257
reference_id CVE-2017-1000257
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 9.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000257
28
reference_url https://security.gentoo.org/glsa/201712-04
reference_id GLSA-201712-04
reference_type
scores
url https://security.gentoo.org/glsa/201712-04
29
reference_url https://access.redhat.com/errata/RHSA-2017:3263
reference_id RHSA-2017:3263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3263
30
reference_url https://usn.ubuntu.com/3441-2/
reference_id USN-3441-2
reference_type
scores
url https://usn.ubuntu.com/3441-2/
31
reference_url https://usn.ubuntu.com/3457-1/
reference_id USN-3457-1
reference_type
scores
url https://usn.ubuntu.com/3457-1/
fixed_packages
aliases CVE-2017-1000257
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j2qx-np45-4qdu
24
url VCID-jeqg-g3en-5udw
vulnerability_id VCID-jeqg-g3en-5udw
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5420.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5420.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5420
reference_id
reference_type
scores
0
value 0.01086
scoring_system epss
scoring_elements 0.77847
published_at 2026-04-01T12:55:00Z
1
value 0.01086
scoring_system epss
scoring_elements 0.77906
published_at 2026-04-13T12:55:00Z
2
value 0.01086
scoring_system epss
scoring_elements 0.77923
published_at 2026-04-11T12:55:00Z
3
value 0.01086
scoring_system epss
scoring_elements 0.77907
published_at 2026-04-12T12:55:00Z
4
value 0.01086
scoring_system epss
scoring_elements 0.77854
published_at 2026-04-02T12:55:00Z
5
value 0.01086
scoring_system epss
scoring_elements 0.77882
published_at 2026-04-04T12:55:00Z
6
value 0.01086
scoring_system epss
scoring_elements 0.77864
published_at 2026-04-07T12:55:00Z
7
value 0.01086
scoring_system epss
scoring_elements 0.77891
published_at 2026-04-08T12:55:00Z
8
value 0.01086
scoring_system epss
scoring_elements 0.77896
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5420
2
reference_url https://curl.se/docs/CVE-2016-5420.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-5420.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1362190
reference_id 1362190
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1362190
8
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
9
reference_url https://access.redhat.com/errata/RHSA-2016:2575
reference_id RHSA-2016:2575
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2575
10
reference_url https://access.redhat.com/errata/RHSA-2016:2957
reference_id RHSA-2016:2957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2957
11
reference_url https://usn.ubuntu.com/3048-1/
reference_id USN-3048-1
reference_type
scores
url https://usn.ubuntu.com/3048-1/
fixed_packages
aliases CVE-2016-5420
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jeqg-g3en-5udw
25
url VCID-jqqf-gmd3-ubcd
vulnerability_id VCID-jqqf-gmd3-ubcd
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8621.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8621.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8621
reference_id
reference_type
scores
0
value 0.0226
scoring_system epss
scoring_elements 0.84539
published_at 2026-04-01T12:55:00Z
1
value 0.0226
scoring_system epss
scoring_elements 0.84617
published_at 2026-04-13T12:55:00Z
2
value 0.0226
scoring_system epss
scoring_elements 0.84555
published_at 2026-04-02T12:55:00Z
3
value 0.0226
scoring_system epss
scoring_elements 0.84576
published_at 2026-04-04T12:55:00Z
4
value 0.0226
scoring_system epss
scoring_elements 0.8458
published_at 2026-04-07T12:55:00Z
5
value 0.0226
scoring_system epss
scoring_elements 0.84601
published_at 2026-04-08T12:55:00Z
6
value 0.0226
scoring_system epss
scoring_elements 0.84608
published_at 2026-04-09T12:55:00Z
7
value 0.0226
scoring_system epss
scoring_elements 0.84627
published_at 2026-04-11T12:55:00Z
8
value 0.0226
scoring_system epss
scoring_elements 0.84622
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8621
2
reference_url https://curl.se/docs/CVE-2016-8621.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8621.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388385
reference_id 1388385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388385
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
20
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
21
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
22
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
23
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
24
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
25
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
26
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
27
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
28
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
aliases CVE-2016-8621
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jqqf-gmd3-ubcd
26
url VCID-jtw4-af4y-nkbk
vulnerability_id VCID-jtw4-af4y-nkbk
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8619.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8619.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8619
reference_id
reference_type
scores
0
value 0.02935
scoring_system epss
scoring_elements 0.86359
published_at 2026-04-01T12:55:00Z
1
value 0.02935
scoring_system epss
scoring_elements 0.86425
published_at 2026-04-13T12:55:00Z
2
value 0.02935
scoring_system epss
scoring_elements 0.8637
published_at 2026-04-02T12:55:00Z
3
value 0.02935
scoring_system epss
scoring_elements 0.86387
published_at 2026-04-04T12:55:00Z
4
value 0.02935
scoring_system epss
scoring_elements 0.86389
published_at 2026-04-07T12:55:00Z
5
value 0.02935
scoring_system epss
scoring_elements 0.86408
published_at 2026-04-08T12:55:00Z
6
value 0.02935
scoring_system epss
scoring_elements 0.86418
published_at 2026-04-09T12:55:00Z
7
value 0.02935
scoring_system epss
scoring_elements 0.86432
published_at 2026-04-11T12:55:00Z
8
value 0.02935
scoring_system epss
scoring_elements 0.8643
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8619
2
reference_url https://curl.se/docs/CVE-2016-8619.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8619.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388379
reference_id 1388379
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388379
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
20
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
21
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
22
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
23
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
24
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
25
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
26
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
27
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
28
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
aliases CVE-2016-8619
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jtw4-af4y-nkbk
27
url VCID-jzuw-73df-mfff
vulnerability_id VCID-jzuw-73df-mfff
summary A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.33, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1301.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1301.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1301
reference_id
reference_type
scores
0
value 0.07499
scoring_system epss
scoring_elements 0.91755
published_at 2026-04-01T12:55:00Z
1
value 0.07499
scoring_system epss
scoring_elements 0.91798
published_at 2026-04-13T12:55:00Z
2
value 0.07499
scoring_system epss
scoring_elements 0.91797
published_at 2026-04-09T12:55:00Z
3
value 0.07499
scoring_system epss
scoring_elements 0.918
published_at 2026-04-11T12:55:00Z
4
value 0.07499
scoring_system epss
scoring_elements 0.91802
published_at 2026-04-12T12:55:00Z
5
value 0.07499
scoring_system epss
scoring_elements 0.91764
published_at 2026-04-02T12:55:00Z
6
value 0.07499
scoring_system epss
scoring_elements 0.9177
published_at 2026-04-04T12:55:00Z
7
value 0.07499
scoring_system epss
scoring_elements 0.91777
published_at 2026-04-07T12:55:00Z
8
value 0.07499
scoring_system epss
scoring_elements 0.9179
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1301
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1560643
reference_id 1560643
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1560643
10
reference_url https://security.archlinux.org/ASA-201804-4
reference_id ASA-201804-4
reference_type
scores
url https://security.archlinux.org/ASA-201804-4
11
reference_url https://security.archlinux.org/AVG-664
reference_id AVG-664
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-664
12
reference_url https://httpd.apache.org/security/json/CVE-2018-1301.json
reference_id CVE-2018-1301
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2018-1301.json
13
reference_url https://access.redhat.com/errata/RHSA-2019:0366
reference_id RHSA-2019:0366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0366
14
reference_url https://access.redhat.com/errata/RHSA-2019:0367
reference_id RHSA-2019:0367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0367
15
reference_url https://access.redhat.com/errata/RHSA-2020:1121
reference_id RHSA-2020:1121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1121
16
reference_url https://usn.ubuntu.com/3627-1/
reference_id USN-3627-1
reference_type
scores
url https://usn.ubuntu.com/3627-1/
17
reference_url https://usn.ubuntu.com/3627-2/
reference_id USN-3627-2
reference_type
scores
url https://usn.ubuntu.com/3627-2/
18
reference_url https://usn.ubuntu.com/3937-2/
reference_id USN-3937-2
reference_type
scores
url https://usn.ubuntu.com/3937-2/
fixed_packages
aliases CVE-2018-1301
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jzuw-73df-mfff
28
url VCID-k8kj-q1je-f7bt
vulnerability_id VCID-k8kj-q1je-f7bt
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7167.json
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7167.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7167
reference_id
reference_type
scores
0
value 0.02289
scoring_system epss
scoring_elements 0.84631
published_at 2026-04-01T12:55:00Z
1
value 0.02289
scoring_system epss
scoring_elements 0.84704
published_at 2026-04-13T12:55:00Z
2
value 0.02289
scoring_system epss
scoring_elements 0.84689
published_at 2026-04-08T12:55:00Z
3
value 0.02289
scoring_system epss
scoring_elements 0.84696
published_at 2026-04-09T12:55:00Z
4
value 0.02289
scoring_system epss
scoring_elements 0.84715
published_at 2026-04-11T12:55:00Z
5
value 0.02289
scoring_system epss
scoring_elements 0.8471
published_at 2026-04-12T12:55:00Z
6
value 0.02289
scoring_system epss
scoring_elements 0.84646
published_at 2026-04-02T12:55:00Z
7
value 0.02289
scoring_system epss
scoring_elements 0.84666
published_at 2026-04-04T12:55:00Z
8
value 0.02289
scoring_system epss
scoring_elements 0.84667
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7167
2
reference_url https://curl.se/docs/CVE-2016-7167.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-7167.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1375906
reference_id 1375906
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1375906
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837945
reference_id 837945
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837945
7
reference_url https://security.archlinux.org/ASA-201609-18
reference_id ASA-201609-18
reference_type
scores
url https://security.archlinux.org/ASA-201609-18
8
reference_url https://security.archlinux.org/ASA-201609-19
reference_id ASA-201609-19
reference_type
scores
url https://security.archlinux.org/ASA-201609-19
9
reference_url https://security.archlinux.org/AVG-20
reference_id AVG-20
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-20
10
reference_url https://security.archlinux.org/AVG-21
reference_id AVG-21
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-21
11
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
12
reference_url https://access.redhat.com/errata/RHSA-2017:2016
reference_id RHSA-2017:2016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2016
13
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
aliases CVE-2016-7167
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k8kj-q1je-f7bt
29
url VCID-q5wm-suxb-jfeb
vulnerability_id VCID-q5wm-suxb-jfeb
summary The expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15715.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15715.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15715
reference_id
reference_type
scores
0
value 0.94103
scoring_system epss
scoring_elements 0.99909
published_at 2026-04-13T12:55:00Z
1
value 0.94103
scoring_system epss
scoring_elements 0.99907
published_at 2026-04-08T12:55:00Z
2
value 0.94103
scoring_system epss
scoring_elements 0.99908
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15715
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1560614
reference_id 1560614
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1560614
10
reference_url https://security.archlinux.org/ASA-201804-4
reference_id ASA-201804-4
reference_type
scores
url https://security.archlinux.org/ASA-201804-4
11
reference_url https://security.archlinux.org/AVG-664
reference_id AVG-664
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-664
12
reference_url https://httpd.apache.org/security/json/CVE-2017-15715.json
reference_id CVE-2017-15715
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2017-15715.json
13
reference_url https://access.redhat.com/errata/RHSA-2019:0366
reference_id RHSA-2019:0366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0366
14
reference_url https://access.redhat.com/errata/RHSA-2019:0367
reference_id RHSA-2019:0367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0367
15
reference_url https://access.redhat.com/errata/RHSA-2020:3958
reference_id RHSA-2020:3958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3958
16
reference_url https://usn.ubuntu.com/3627-1/
reference_id USN-3627-1
reference_type
scores
url https://usn.ubuntu.com/3627-1/
17
reference_url https://usn.ubuntu.com/3627-2/
reference_id USN-3627-2
reference_type
scores
url https://usn.ubuntu.com/3627-2/
fixed_packages
aliases CVE-2017-15715
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q5wm-suxb-jfeb
30
url VCID-scf1-zmu7-e3b2
vulnerability_id VCID-scf1-zmu7-e3b2
summary A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.33 due to an out of bound read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of mod_cache_socache.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1303.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1303.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1303
reference_id
reference_type
scores
0
value 0.40137
scoring_system epss
scoring_elements 0.97315
published_at 2026-04-01T12:55:00Z
1
value 0.40137
scoring_system epss
scoring_elements 0.97337
published_at 2026-04-13T12:55:00Z
2
value 0.40137
scoring_system epss
scoring_elements 0.97333
published_at 2026-04-09T12:55:00Z
3
value 0.40137
scoring_system epss
scoring_elements 0.97335
published_at 2026-04-11T12:55:00Z
4
value 0.40137
scoring_system epss
scoring_elements 0.97336
published_at 2026-04-12T12:55:00Z
5
value 0.40137
scoring_system epss
scoring_elements 0.97321
published_at 2026-04-02T12:55:00Z
6
value 0.40137
scoring_system epss
scoring_elements 0.97325
published_at 2026-04-04T12:55:00Z
7
value 0.40137
scoring_system epss
scoring_elements 0.97326
published_at 2026-04-07T12:55:00Z
8
value 0.40137
scoring_system epss
scoring_elements 0.97332
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1303
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1560399
reference_id 1560399
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1560399
10
reference_url https://security.archlinux.org/ASA-201804-4
reference_id ASA-201804-4
reference_type
scores
url https://security.archlinux.org/ASA-201804-4
11
reference_url https://security.archlinux.org/AVG-664
reference_id AVG-664
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-664
12
reference_url https://httpd.apache.org/security/json/CVE-2018-1303.json
reference_id CVE-2018-1303
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2018-1303.json
13
reference_url https://access.redhat.com/errata/RHSA-2019:0366
reference_id RHSA-2019:0366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0366
14
reference_url https://access.redhat.com/errata/RHSA-2019:0367
reference_id RHSA-2019:0367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0367
15
reference_url https://access.redhat.com/errata/RHSA-2020:3958
reference_id RHSA-2020:3958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3958
16
reference_url https://usn.ubuntu.com/3627-1/
reference_id USN-3627-1
reference_type
scores
url https://usn.ubuntu.com/3627-1/
17
reference_url https://usn.ubuntu.com/3627-2/
reference_id USN-3627-2
reference_type
scores
url https://usn.ubuntu.com/3627-2/
fixed_packages
aliases CVE-2018-1303
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-scf1-zmu7-e3b2
31
url VCID-tz47-j4ey-t7g6
vulnerability_id VCID-tz47-j4ey-t7g6
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14618.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14618.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14618
reference_id
reference_type
scores
0
value 0.00493
scoring_system epss
scoring_elements 0.65698
published_at 2026-04-13T12:55:00Z
1
value 0.006
scoring_system epss
scoring_elements 0.69387
published_at 2026-04-01T12:55:00Z
2
value 0.006
scoring_system epss
scoring_elements 0.69481
published_at 2026-04-11T12:55:00Z
3
value 0.006
scoring_system epss
scoring_elements 0.69466
published_at 2026-04-12T12:55:00Z
4
value 0.006
scoring_system epss
scoring_elements 0.69398
published_at 2026-04-02T12:55:00Z
5
value 0.006
scoring_system epss
scoring_elements 0.69414
published_at 2026-04-04T12:55:00Z
6
value 0.006
scoring_system epss
scoring_elements 0.69393
published_at 2026-04-07T12:55:00Z
7
value 0.006
scoring_system epss
scoring_elements 0.69444
published_at 2026-04-08T12:55:00Z
8
value 0.006
scoring_system epss
scoring_elements 0.6946
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14618
2
reference_url https://curl.se/docs/CVE-2018-14618.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2018-14618.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1622707
reference_id 1622707
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1622707
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908327
reference_id 908327
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908327
7
reference_url https://security.gentoo.org/glsa/201903-03
reference_id GLSA-201903-03
reference_type
scores
url https://security.gentoo.org/glsa/201903-03
8
reference_url https://access.redhat.com/errata/RHSA-2019:1880
reference_id RHSA-2019:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:1880
9
reference_url https://usn.ubuntu.com/3765-1/
reference_id USN-3765-1
reference_type
scores
url https://usn.ubuntu.com/3765-1/
10
reference_url https://usn.ubuntu.com/3765-2/
reference_id USN-3765-2
reference_type
scores
url https://usn.ubuntu.com/3765-2/
fixed_packages
aliases CVE-2018-14618
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tz47-j4ey-t7g6
32
url VCID-vxpj-xygq-9be2
vulnerability_id VCID-vxpj-xygq-9be2
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8615.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8615.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8615
reference_id
reference_type
scores
0
value 0.02337
scoring_system epss
scoring_elements 0.84774
published_at 2026-04-01T12:55:00Z
1
value 0.02337
scoring_system epss
scoring_elements 0.84849
published_at 2026-04-13T12:55:00Z
2
value 0.02337
scoring_system epss
scoring_elements 0.84789
published_at 2026-04-02T12:55:00Z
3
value 0.02337
scoring_system epss
scoring_elements 0.84808
published_at 2026-04-04T12:55:00Z
4
value 0.02337
scoring_system epss
scoring_elements 0.8481
published_at 2026-04-07T12:55:00Z
5
value 0.02337
scoring_system epss
scoring_elements 0.84832
published_at 2026-04-08T12:55:00Z
6
value 0.02337
scoring_system epss
scoring_elements 0.84839
published_at 2026-04-09T12:55:00Z
7
value 0.02337
scoring_system epss
scoring_elements 0.84857
published_at 2026-04-11T12:55:00Z
8
value 0.02337
scoring_system epss
scoring_elements 0.84854
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8615
2
reference_url https://curl.se/docs/CVE-2016-8615.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8615.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388370
reference_id 1388370
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388370
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
20
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
21
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
22
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
23
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
24
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
25
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
26
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
27
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
28
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
aliases CVE-2016-8615
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vxpj-xygq-9be2
33
url VCID-vyk2-s5ut-ubbz
vulnerability_id VCID-vyk2-s5ut-ubbz
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8618.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8618.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8618
reference_id
reference_type
scores
0
value 0.01654
scoring_system epss
scoring_elements 0.81967
published_at 2026-04-01T12:55:00Z
1
value 0.01654
scoring_system epss
scoring_elements 0.82033
published_at 2026-04-13T12:55:00Z
2
value 0.01654
scoring_system epss
scoring_elements 0.82001
published_at 2026-04-04T12:55:00Z
3
value 0.01654
scoring_system epss
scoring_elements 0.81997
published_at 2026-04-07T12:55:00Z
4
value 0.01654
scoring_system epss
scoring_elements 0.82024
published_at 2026-04-08T12:55:00Z
5
value 0.01654
scoring_system epss
scoring_elements 0.82031
published_at 2026-04-09T12:55:00Z
6
value 0.01654
scoring_system epss
scoring_elements 0.82051
published_at 2026-04-11T12:55:00Z
7
value 0.01654
scoring_system epss
scoring_elements 0.8204
published_at 2026-04-12T12:55:00Z
8
value 0.01654
scoring_system epss
scoring_elements 0.81978
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8618
2
reference_url https://curl.se/docs/CVE-2016-8618.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8618.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388378
reference_id 1388378
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388378
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
19
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
20
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
21
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
22
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
aliases CVE-2016-8618
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vyk2-s5ut-ubbz
34
url VCID-wrh2-77dv-hbdz
vulnerability_id VCID-wrh2-77dv-hbdz
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url https://access.redhat.com/errata/RHSA-2018:3558
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3558
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8817.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8817.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8817
reference_id
reference_type
scores
0
value 0.00852
scoring_system epss
scoring_elements 0.7491
published_at 2026-04-13T12:55:00Z
1
value 0.00852
scoring_system epss
scoring_elements 0.74872
published_at 2026-04-07T12:55:00Z
2
value 0.00852
scoring_system epss
scoring_elements 0.74905
published_at 2026-04-08T12:55:00Z
3
value 0.00852
scoring_system epss
scoring_elements 0.74918
published_at 2026-04-09T12:55:00Z
4
value 0.00852
scoring_system epss
scoring_elements 0.74941
published_at 2026-04-11T12:55:00Z
5
value 0.00852
scoring_system epss
scoring_elements 0.74919
published_at 2026-04-12T12:55:00Z
6
value 0.00949
scoring_system epss
scoring_elements 0.76291
published_at 2026-04-01T12:55:00Z
7
value 0.00949
scoring_system epss
scoring_elements 0.76294
published_at 2026-04-02T12:55:00Z
8
value 0.00949
scoring_system epss
scoring_elements 0.76325
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8817
3
reference_url https://curl.haxx.se/docs/adv_2017-ae72.html
reference_id
reference_type
scores
url https://curl.haxx.se/docs/adv_2017-ae72.html
4
reference_url https://curl.se/docs/CVE-2017-8817.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2017-8817.html
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8816
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817
7
reference_url http://security.cucumberlinux.com/security/details.php?id=162
reference_id
reference_type
scores
url http://security.cucumberlinux.com/security/details.php?id=162
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
1
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html
10
reference_url https://www.debian.org/security/2017/dsa-4051
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4051
11
reference_url http://www.securityfocus.com/bid/102057
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102057
12
reference_url http://www.securitytracker.com/id/1039897
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039897
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1515760
reference_id 1515760
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1515760
14
reference_url https://security.archlinux.org/ASA-201711-33
reference_id ASA-201711-33
reference_type
scores
url https://security.archlinux.org/ASA-201711-33
15
reference_url https://security.archlinux.org/ASA-201711-34
reference_id ASA-201711-34
reference_type
scores
url https://security.archlinux.org/ASA-201711-34
16
reference_url https://security.archlinux.org/ASA-201711-35
reference_id ASA-201711-35
reference_type
scores
url https://security.archlinux.org/ASA-201711-35
17
reference_url https://security.archlinux.org/ASA-201711-36
reference_id ASA-201711-36
reference_type
scores
url https://security.archlinux.org/ASA-201711-36
18
reference_url https://security.archlinux.org/ASA-201711-37
reference_id ASA-201711-37
reference_type
scores
url https://security.archlinux.org/ASA-201711-37
19
reference_url https://security.archlinux.org/ASA-201711-38
reference_id ASA-201711-38
reference_type
scores
url https://security.archlinux.org/ASA-201711-38
20
reference_url https://security.archlinux.org/AVG-521
reference_id AVG-521
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-521
21
reference_url https://security.archlinux.org/AVG-522
reference_id AVG-522
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-522
22
reference_url https://security.archlinux.org/AVG-523
reference_id AVG-523
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-523
23
reference_url https://security.archlinux.org/AVG-524
reference_id AVG-524
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-524
24
reference_url https://security.archlinux.org/AVG-525
reference_id AVG-525
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-525
25
reference_url https://security.archlinux.org/AVG-526
reference_id AVG-526
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-526
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8817
reference_id CVE-2017-8817
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8817
31
reference_url https://security.gentoo.org/glsa/201712-04
reference_id GLSA-201712-04
reference_type
scores
url https://security.gentoo.org/glsa/201712-04
32
reference_url https://usn.ubuntu.com/3498-1/
reference_id USN-3498-1
reference_type
scores
url https://usn.ubuntu.com/3498-1/
33
reference_url https://usn.ubuntu.com/3498-2/
reference_id USN-3498-2
reference_type
scores
url https://usn.ubuntu.com/3498-2/
fixed_packages
aliases CVE-2017-8817
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wrh2-77dv-hbdz
35
url VCID-yxks-8529-23bj
vulnerability_id VCID-yxks-8529-23bj
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8625.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8625.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8625
reference_id
reference_type
scores
0
value 0.01526
scoring_system epss
scoring_elements 0.81219
published_at 2026-04-01T12:55:00Z
1
value 0.01526
scoring_system epss
scoring_elements 0.8129
published_at 2026-04-12T12:55:00Z
2
value 0.01526
scoring_system epss
scoring_elements 0.81228
published_at 2026-04-02T12:55:00Z
3
value 0.01526
scoring_system epss
scoring_elements 0.81251
published_at 2026-04-04T12:55:00Z
4
value 0.01526
scoring_system epss
scoring_elements 0.8125
published_at 2026-04-07T12:55:00Z
5
value 0.01526
scoring_system epss
scoring_elements 0.81278
published_at 2026-04-08T12:55:00Z
6
value 0.01526
scoring_system epss
scoring_elements 0.81283
published_at 2026-04-13T12:55:00Z
7
value 0.01526
scoring_system epss
scoring_elements 0.81304
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8625
2
reference_url https://curl.se/docs/CVE-2016-8625.html
reference_id
reference_type
scores
0
value High
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8625.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388392
reference_id 1388392
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388392
6
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
7
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
8
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
9
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
10
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
11
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
12
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
13
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
14
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
15
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
16
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
17
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
18
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
fixed_packages
aliases CVE-2016-8625
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yxks-8529-23bj
36
url VCID-zc2p-sfu7-jkhc
vulnerability_id VCID-zc2p-sfu7-jkhc
summary mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user's credentials. If the header value is not present in the charset conversion table, a fallback mechanism is used to truncate it to a two characters value to allow a quick retry (for example, 'en-US' is truncated to 'en'). A header value of less than two characters forces an out of bound write of one NUL byte to a memory location that is not part of the string. In the worst case, quite unlikely, the process would crash which could be used as a Denial of Service attack. In the more likely case, this memory is already reserved for future use and the issue has no effect at all.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15710.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15710.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15710
reference_id
reference_type
scores
0
value 0.08002
scoring_system epss
scoring_elements 0.92065
published_at 2026-04-01T12:55:00Z
1
value 0.08002
scoring_system epss
scoring_elements 0.92105
published_at 2026-04-12T12:55:00Z
2
value 0.08002
scoring_system epss
scoring_elements 0.92097
published_at 2026-04-08T12:55:00Z
3
value 0.08002
scoring_system epss
scoring_elements 0.921
published_at 2026-04-13T12:55:00Z
4
value 0.08002
scoring_system epss
scoring_elements 0.92104
published_at 2026-04-11T12:55:00Z
5
value 0.08002
scoring_system epss
scoring_elements 0.92072
published_at 2026-04-02T12:55:00Z
6
value 0.08002
scoring_system epss
scoring_elements 0.9208
published_at 2026-04-04T12:55:00Z
7
value 0.08002
scoring_system epss
scoring_elements 0.92085
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15710
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1560599
reference_id 1560599
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1560599
10
reference_url https://security.archlinux.org/ASA-201804-4
reference_id ASA-201804-4
reference_type
scores
url https://security.archlinux.org/ASA-201804-4
11
reference_url https://security.archlinux.org/AVG-664
reference_id AVG-664
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-664
12
reference_url https://httpd.apache.org/security/json/CVE-2017-15710.json
reference_id CVE-2017-15710
reference_type
scores
0
value low
scoring_system apache_httpd
scoring_elements
url https://httpd.apache.org/security/json/CVE-2017-15710.json
13
reference_url https://access.redhat.com/errata/RHSA-2019:0366
reference_id RHSA-2019:0366
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0366
14
reference_url https://access.redhat.com/errata/RHSA-2019:0367
reference_id RHSA-2019:0367
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:0367
15
reference_url https://access.redhat.com/errata/RHSA-2020:1121
reference_id RHSA-2020:1121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1121
16
reference_url https://usn.ubuntu.com/3627-1/
reference_id USN-3627-1
reference_type
scores
url https://usn.ubuntu.com/3627-1/
17
reference_url https://usn.ubuntu.com/3627-2/
reference_id USN-3627-2
reference_type
scores
url https://usn.ubuntu.com/3627-2/
18
reference_url https://usn.ubuntu.com/3937-2/
reference_id USN-3937-2
reference_type
scores
url https://usn.ubuntu.com/3937-2/
fixed_packages
aliases CVE-2017-15710
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zc2p-sfu7-jkhc
37
url VCID-zxz2-xfpd-pbay
vulnerability_id VCID-zxz2-xfpd-pbay
summary
Multiple vulnerabilities have been found in cURL, the worst of
    which could allow remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8617.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8617.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-8617
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19573
published_at 2026-04-01T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19517
published_at 2026-04-13T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19714
published_at 2026-04-02T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19763
published_at 2026-04-04T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19488
published_at 2026-04-07T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19567
published_at 2026-04-08T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19619
published_at 2026-04-09T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19623
published_at 2026-04-11T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19575
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-8617
2
reference_url https://curl.se/docs/CVE-2016-8617.html
reference_id
reference_type
scores
0
value Medium
scoring_system cvssv3.1
scoring_elements
url https://curl.se/docs/CVE-2016-8617.html
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388377
reference_id 1388377
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388377
15
reference_url https://security.archlinux.org/ASA-201611-10
reference_id ASA-201611-10
reference_type
scores
url https://security.archlinux.org/ASA-201611-10
16
reference_url https://security.archlinux.org/ASA-201611-4
reference_id ASA-201611-4
reference_type
scores
url https://security.archlinux.org/ASA-201611-4
17
reference_url https://security.archlinux.org/ASA-201611-5
reference_id ASA-201611-5
reference_type
scores
url https://security.archlinux.org/ASA-201611-5
18
reference_url https://security.archlinux.org/ASA-201611-7
reference_id ASA-201611-7
reference_type
scores
url https://security.archlinux.org/ASA-201611-7
19
reference_url https://security.archlinux.org/ASA-201611-8
reference_id ASA-201611-8
reference_type
scores
url https://security.archlinux.org/ASA-201611-8
20
reference_url https://security.archlinux.org/ASA-201611-9
reference_id ASA-201611-9
reference_type
scores
url https://security.archlinux.org/ASA-201611-9
21
reference_url https://security.archlinux.org/AVG-60
reference_id AVG-60
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-60
22
reference_url https://security.archlinux.org/AVG-61
reference_id AVG-61
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-61
23
reference_url https://security.archlinux.org/AVG-62
reference_id AVG-62
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-62
24
reference_url https://security.archlinux.org/AVG-63
reference_id AVG-63
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-63
25
reference_url https://security.archlinux.org/AVG-65
reference_id AVG-65
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-65
26
reference_url https://security.archlinux.org/AVG-66
reference_id AVG-66
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-66
27
reference_url https://security.gentoo.org/glsa/201701-47
reference_id GLSA-201701-47
reference_type
scores
url https://security.gentoo.org/glsa/201701-47
28
reference_url https://usn.ubuntu.com/3123-1/
reference_id USN-3123-1
reference_type
scores
url https://usn.ubuntu.com/3123-1/
fixed_packages
aliases CVE-2016-8617
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zxz2-xfpd-pbay
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/httpd24-nghttp2@1.7.1-7%3Farch=el6