{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","type":"deb","namespace":"debian","name":"curl","version":"8.20.0-1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69487?format=json","vulnerability_id":"VCID-176a-agbw-hqdy","summary":"curl: libcurl: QUIC Certificate Pinning Bypass","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5025.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5025.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5025","reference_id":"","reference_type":"","scores":[{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18692","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18979","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18986","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18939","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18888","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18841","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18854","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18867","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18756","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18736","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.19078","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.19129","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18846","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18926","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5025"},{"reference_url":"https://curl.se/docs/CVE-2025-5025.html","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T16:19:34Z/"}],"url":"https://curl.se/docs/CVE-2025-5025.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/3153497","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T16:19:34Z/"}],"url":"https://hackerone.com/reports/3153497"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2368888","reference_id":"2368888","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2368888"},{"reference_url":"https://security.archlinux.org/AVG-2887","reference_id":"AVG-2887","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2887"},{"reference_url":"https://curl.se/docs/CVE-2025-5025.json","reference_id":"CVE-2025-5025.json","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-30T16:19:34Z/"}],"url":"https://curl.se/docs/CVE-2025-5025.json"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/585168?format=json","purl":"pkg:deb/debian/curl@8.14.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2025-5025"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-176a-agbw-hqdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49272?format=json","vulnerability_id":"VCID-1k8f-qgcv-xkhb","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27782.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27782.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27782","reference_id":"","reference_type":"","scores":[{"value":"0.00469","scoring_system":"epss","scoring_elements":"0.64581","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00469","scoring_system":"epss","scoring_elements":"0.64484","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00469","scoring_system":"epss","scoring_elements":"0.64515","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00469","scoring_system":"epss","scoring_elements":"0.64472","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00469","scoring_system":"epss","scoring_elements":"0.6452","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00469","scoring_system":"epss","scoring_elements":"0.64536","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00469","scoring_system":"epss","scoring_elements":"0.64552","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00469","scoring_system":"epss","scoring_elements":"0.6454","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00469","scoring_system":"epss","scoring_elements":"0.64512","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00469","scoring_system":"epss","scoring_elements":"0.64546","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00469","scoring_system":"epss","scoring_elements":"0.64558","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00469","scoring_system":"epss","scoring_elements":"0.64551","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00469","scoring_system":"epss","scoring_elements":"0.64569","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00469","scoring_system":"epss","scoring_elements":"0.64582","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27782"},{"reference_url":"https://curl.se/docs/CVE-2022-27782.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-27782.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1555796","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:54:53Z/"}],"url":"https://hackerone.com/reports/1555796"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082215","reference_id":"2082215","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082215"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/03/20/6","reference_id":"6","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:54:53Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/03/20/6"},{"reference_url":"https://security.archlinux.org/AVG-2706","reference_id":"AVG-2706","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2706"},{"reference_url":"https://www.debian.org/security/2022/dsa-5197","reference_id":"dsa-5197","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:54:53Z/"}],"url":"https://www.debian.org/security/2022/dsa-5197"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:54:53Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:54:53Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220609-0009/","reference_id":"ntap-20220609-0009","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:54:53Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220609-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5245","reference_id":"RHSA-2022:5245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5313","reference_id":"RHSA-2022:5313","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5313"},{"reference_url":"https://usn.ubuntu.com/5412-1/","reference_id":"USN-5412-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5412-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582658?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582920?format=json","purl":"pkg:deb/debian/curl@7.83.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2022-27782"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1k8f-qgcv-xkhb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49714?format=json","vulnerability_id":"VCID-1mf9-u8y1-zbb1","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow attackers to bypass intended restrictions.","references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3558","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:45:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:3558"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000101.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000101.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000101","reference_id":"","reference_type":"","scores":[{"value":"0.00584","scoring_system":"epss","scoring_elements":"0.69124","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00584","scoring_system":"epss","scoring_elements":"0.69109","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00584","scoring_system":"epss","scoring_elements":"0.69116","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.7019","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70084","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70096","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70111","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70088","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70135","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70151","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70175","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.7016","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70147","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00763","scoring_system":"epss","scoring_elements":"0.7342","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00763","scoring_system":"epss","scoring_elements":"0.73414","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000101"},{"reference_url":"https://curl.haxx.se/docs/adv_20170809A.html","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:45:32Z/"}],"url":"https://curl.haxx.se/docs/adv_20170809A.html"},{"reference_url":"https://curl.se/docs/CVE-2017-1000101.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2017-1000101.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/HT208221","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:45:32Z/"}],"url":"https://support.apple.com/HT208221"},{"reference_url":"http://www.debian.org/security/2017/dsa-3992","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:45:32Z/"}],"url":"http://www.debian.org/security/2017/dsa-3992"},{"reference_url":"http://www.securityfocus.com/bid/100249","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:45:32Z/"}],"url":"http://www.securityfocus.com/bid/100249"},{"reference_url":"http://www.securitytracker.com/id/1039117","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:45:32Z/"}],"url":"http://www.securitytracker.com/id/1039117"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1478309","reference_id":"1478309","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1478309"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871554","reference_id":"871554","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871554"},{"reference_url":"https://security.archlinux.org/ASA-201708-16","reference_id":"ASA-201708-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201708-16"},{"reference_url":"https://security.archlinux.org/AVG-370","reference_id":"AVG-370","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-370"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.37.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.47.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.49.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.49.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.49.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.49.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.49.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.49.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.50.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.50.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.50.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.50.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.50.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.51.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.51.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.51.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.52.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.52.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.52.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.52.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.52.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.52.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.53.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.54.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.54.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.54.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.54.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.54.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.54.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.55.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.55.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.55.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000101","reference_id":"CVE-2017-1000101","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000101"},{"reference_url":"https://security.gentoo.org/glsa/201709-14","reference_id":"GLSA-201709-14","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:45:32Z/"}],"url":"https://security.gentoo.org/glsa/201709-14"},{"reference_url":"https://usn.ubuntu.com/3441-1/","reference_id":"USN-3441-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3441-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585811?format=json","purl":"pkg:deb/debian/curl@7.55.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.55.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2017-1000101"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1mf9-u8y1-zbb1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49715?format=json","vulnerability_id":"VCID-26ju-84rx-c7b9","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow attackers to bypass intended restrictions.","references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3558","reference_id":"","reference_type":"","scores":[{"value":"2.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:44:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:3558"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7407.json","reference_id":"","reference_type":"","scores":[{"value":"2.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7407.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7407","reference_id":"","reference_type":"","scores":[{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51162","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51184","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51563","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.5156","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51604","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51583","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51572","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51472","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51523","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51549","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51509","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51614","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51849","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51811","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51854","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7407"},{"reference_url":"https://curl.se/docs/CVE-2017-7407.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2017-7407.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:S/C:P/I:N/A:N"},{"value":"2.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13","reference_id":"","reference_type":"","scores":[{"value":"2.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:44:34Z/"}],"url":"https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","reference_id":"","reference_type":"","scores":[{"value":"2.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:44:34Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1439190","reference_id":"1439190","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1439190"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859500","reference_id":"859500","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859500"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7407","reference_id":"CVE-2017-7407","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"},{"value":"2.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7407"},{"reference_url":"https://security.gentoo.org/glsa/201709-14","reference_id":"GLSA-201709-14","reference_type":"","scores":[{"value":"2.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:44:34Z/"}],"url":"https://security.gentoo.org/glsa/201709-14"},{"reference_url":"https://usn.ubuntu.com/3441-1/","reference_id":"USN-3441-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3441-1/"},{"reference_url":"https://usn.ubuntu.com/3441-2/","reference_id":"USN-3441-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3441-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586791?format=json","purl":"pkg:deb/debian/curl@7.52.1-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.52.1-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2017-7407"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-26ju-84rx-c7b9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71915?format=json","vulnerability_id":"VCID-26p8-15d6-kbb1","summary":"libcurl: Double Close of Eventfd in libcurl","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0665.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0665.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0665","reference_id":"","reference_type":"","scores":[{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89243","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89214","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.8921","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89208","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89221","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.8922","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89216","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89234","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.8924","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89164","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89179","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89182","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.892","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04569","scoring_system":"epss","scoring_elements":"0.89204","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0665"},{"reference_url":"https://curl.se/docs/CVE-2025-0665.html","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-17T17:42:03Z/"}],"url":"https://curl.se/docs/CVE-2025-0665.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/2954286","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-17T17:42:03Z/"}],"url":"https://hackerone.com/reports/2954286"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2343895","reference_id":"2343895","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2343895"},{"reference_url":"https://curl.se/docs/CVE-2025-0665.json","reference_id":"CVE-2025-0665.json","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-17T17:42:03Z/"}],"url":"https://curl.se/docs/CVE-2025-0665.json"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582847?format=json","purl":"pkg:deb/debian/curl@8.12.0%2Bgit20250209.89ed161%2Bds-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.12.0%252Bgit20250209.89ed161%252Bds-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2025-0665"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-26p8-15d6-kbb1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34392?format=json","vulnerability_id":"VCID-29n1-4u2b-tkgj","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16842.json","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16842.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16842","reference_id":"","reference_type":"","scores":[{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31838","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31967","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.32009","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31828","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31881","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31913","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31909","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36729","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37128","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37101","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37148","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36817","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36849","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37074","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.3713","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16842"},{"reference_url":"https://curl.se/docs/CVE-2018-16842.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2018-16842.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1042014","reference_id":"1042014","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:56:25Z/"}],"url":"http://www.securitytracker.com/id/1042014"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1644124","reference_id":"1644124","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1644124"},{"reference_url":"https://security.archlinux.org/ASA-201811-4","reference_id":"ASA-201811-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201811-4"},{"reference_url":"https://security.archlinux.org/AVG-795","reference_id":"AVG-795","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-795"},{"reference_url":"https://curl.haxx.se/docs/CVE-2018-16842.html","reference_id":"CVE-2018-16842.html","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:56:25Z/"}],"url":"https://curl.haxx.se/docs/CVE-2018-16842.html"},{"reference_url":"https://github.com/curl/curl/commit/d530e92f59ae9bb2d47066c3c460b25d2ffeb211","reference_id":"d530e92f59ae9bb2d47066c3c460b25d2ffeb211","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:56:25Z/"}],"url":"https://github.com/curl/curl/commit/d530e92f59ae9bb2d47066c3c460b25d2ffeb211"},{"reference_url":"https://www.debian.org/security/2018/dsa-4331","reference_id":"dsa-4331","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:56:25Z/"}],"url":"https://www.debian.org/security/2018/dsa-4331"},{"reference_url":"https://security.gentoo.org/glsa/201903-03","reference_id":"GLSA-201903-03","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:56:25Z/"}],"url":"https://security.gentoo.org/glsa/201903-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2181","reference_id":"RHSA-2019:2181","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:56:25Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:2181"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16842","reference_id":"show_bug.cgi?id=CVE-2018-16842","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:56:25Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16842"},{"reference_url":"https://usn.ubuntu.com/3805-1/","reference_id":"USN-3805-1","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:56:25Z/"}],"url":"https://usn.ubuntu.com/3805-1/"},{"reference_url":"https://usn.ubuntu.com/3805-2/","reference_id":"USN-3805-2","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:56:25Z/"}],"url":"https://usn.ubuntu.com/3805-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583784?format=json","purl":"pkg:deb/debian/curl@7.62.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.62.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2018-16842"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-29n1-4u2b-tkgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47223?format=json","vulnerability_id":"VCID-2b39-ubrt-hkc6","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which may lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5436.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5436.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5436","reference_id":"","reference_type":"","scores":[{"value":"0.11139","scoring_system":"epss","scoring_elements":"0.93439","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11139","scoring_system":"epss","scoring_elements":"0.93447","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11139","scoring_system":"epss","scoring_elements":"0.93455","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11139","scoring_system":"epss","scoring_elements":"0.93456","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11139","scoring_system":"epss","scoring_elements":"0.93464","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11139","scoring_system":"epss","scoring_elements":"0.93467","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11139","scoring_system":"epss","scoring_elements":"0.93473","published_at":"2026-04-11T12:55:00Z"},{"value":"0.13273","scoring_system":"epss","scoring_elements":"0.94181","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13273","scoring_system":"epss","scoring_elements":"0.94161","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13273","scoring_system":"epss","scoring_elements":"0.94177","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13581","scoring_system":"epss","scoring_elements":"0.94257","published_at":"2026-04-29T12:55:00Z"},{"value":"0.13581","scoring_system":"epss","scoring_elements":"0.94258","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5436"},{"reference_url":"https://curl.se/docs/CVE-2019-5436.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2019-5436.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5436","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5436"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/550696","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/550696"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1710620","reference_id":"1710620","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1710620"},{"reference_url":"http://www.openwall.com/lists/oss-security/2019/09/11/6","reference_id":"6","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:51:08Z/"}],"url":"http://www.openwall.com/lists/oss-security/2019/09/11/6"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929351","reference_id":"929351","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929351"},{"reference_url":"https://security.archlinux.org/ASA-201905-11","reference_id":"ASA-201905-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201905-11"},{"reference_url":"https://security.archlinux.org/ASA-201905-12","reference_id":"ASA-201905-12","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201905-12"},{"reference_url":"https://security.archlinux.org/ASA-201905-13","reference_id":"ASA-201905-13","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201905-13"},{"reference_url":"https://security.archlinux.org/ASA-201905-14","reference_id":"ASA-201905-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201905-14"},{"reference_url":"https://security.archlinux.org/ASA-201905-15","reference_id":"ASA-201905-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201905-15"},{"reference_url":"https://security.archlinux.org/ASA-201905-16","reference_id":"ASA-201905-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201905-16"},{"reference_url":"https://security.archlinux.org/AVG-959","reference_id":"AVG-959","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-959"},{"reference_url":"https://security.archlinux.org/AVG-960","reference_id":"AVG-960","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-960"},{"reference_url":"https://security.archlinux.org/AVG-961","reference_id":"AVG-961","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-961"},{"reference_url":"https://security.archlinux.org/AVG-962","reference_id":"AVG-962","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-962"},{"reference_url":"https://security.archlinux.org/AVG-963","reference_id":"AVG-963","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-963"},{"reference_url":"https://security.archlinux.org/AVG-964","reference_id":"AVG-964","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-964"},{"reference_url":"https://curl.haxx.se/docs/CVE-2019-5436.html","reference_id":"CVE-2019-5436.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:51:08Z/"}],"url":"https://curl.haxx.se/docs/CVE-2019-5436.html"},{"reference_url":"https://security.gentoo.org/glsa/202003-29","reference_id":"GLSA-202003-29","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:51:08Z/"}],"url":"https://security.gentoo.org/glsa/202003-29"},{"reference_url":"https://support.f5.com/csp/article/K55133295","reference_id":"K55133295","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:51:08Z/"}],"url":"https://support.f5.com/csp/article/K55133295"},{"reference_url":"https://support.f5.com/csp/article/K55133295?utm_source=f5support&amp%3Butm_medium=RSS","reference_id":"K55133295?utm_source=f5support&amp%3Butm_medium=RSS","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:51:08Z/"}],"url":"https://support.f5.com/csp/article/K55133295?utm_source=f5support&amp%3Butm_medium=RSS"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html","reference_id":"msg00008.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:51:08Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00008.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:51:08Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00017.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190606-0004/","reference_id":"ntap-20190606-0004","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:51:08Z/"}],"url":"https://security.netapp.com/advisory/ntap-20190606-0004/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1020","reference_id":"RHSA-2020:1020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1792","reference_id":"RHSA-2020:1792","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1792"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:2505","reference_id":"RHSA-2020:2505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:2505"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SMG3V4VTX2SE3EW3HQTN3DDLQBTORQC2/","reference_id":"SMG3V4VTX2SE3EW3HQTN3DDLQBTORQC2","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:51:08Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SMG3V4VTX2SE3EW3HQTN3DDLQBTORQC2/"},{"reference_url":"https://usn.ubuntu.com/3993-1/","reference_id":"USN-3993-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3993-1/"},{"reference_url":"https://usn.ubuntu.com/3993-2/","reference_id":"USN-3993-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3993-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584375?format=json","purl":"pkg:deb/debian/curl@7.64.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.64.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2019-5436"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2b39-ubrt-hkc6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64301?format=json","vulnerability_id":"VCID-2cx5-1qnw-uufj","summary":"curl: curl: Authentication bypass due to incorrect connection reuse with Negotiate authentication","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1965.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1965.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-1965","reference_id":"","reference_type":"","scores":[{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16891","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17194","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17246","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16802","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16949","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16923","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19223","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19246","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19144","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19232","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19134","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19092","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19316","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19261","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-1965"},{"reference_url":"https://curl.se/docs/CVE-2026-1965.html","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:31:56Z/"}],"url":"https://curl.se/docs/CVE-2026-1965.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1965","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1965"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2446448","reference_id":"2446448","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2446448"},{"reference_url":"https://curl.se/docs/CVE-2026-1965.json","reference_id":"CVE-2026-1965.json","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:31:56Z/"}],"url":"https://curl.se/docs/CVE-2026-1965.json"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6893","reference_id":"RHSA-2026:6893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6893"},{"reference_url":"https://usn.ubuntu.com/8084-1/","reference_id":"USN-8084-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8084-1/"},{"reference_url":"https://usn.ubuntu.com/8099-1/","reference_id":"USN-8099-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8099-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/921946?format=json","purl":"pkg:deb/debian/curl@8.19.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2026-1965"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2cx5-1qnw-uufj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60689?format=json","vulnerability_id":"VCID-2f5z-vxsz-yqdv","summary":"A vulnerability in cURL may allow for arbitrary file access.","references":[{"reference_url":"http://curl.haxx.se/docs/adv_20090303.html","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/docs/adv_20090303.html"},{"reference_url":"http://curl.haxx.se/lxr/source/CHANGES","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/lxr/source/CHANGES"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html"},{"reference_url":"http://lists.vmware.com/pipermail/security-announce/2009/000060.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.vmware.com/pipermail/security-announce/2009/000060.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0037.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0037.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0037","reference_id":"","reference_type":"","scores":[{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.92823","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.9286","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.92861","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.92865","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.92872","published_at":"2026-04-24T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.9283","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.92834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.92832","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.92841","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.92845","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.9285","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10036","scoring_system":"epss","scoring_elements":"0.93092","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10036","scoring_system":"epss","scoring_elements":"0.93089","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0037"},{"reference_url":"https://curl.se/docs/CVE-2009-0037.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2009-0037.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037"},{"reference_url":"http://secunia.com/advisories/34138","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34138"},{"reference_url":"http://secunia.com/advisories/34202","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34202"},{"reference_url":"http://secunia.com/advisories/34237","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34237"},{"reference_url":"http://secunia.com/advisories/34251","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34251"},{"reference_url":"http://secunia.com/advisories/34255","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34255"},{"reference_url":"http://secunia.com/advisories/34259","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34259"},{"reference_url":"http://secunia.com/advisories/34399","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34399"},{"reference_url":"http://secunia.com/advisories/35766","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35766"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200903-21.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200903-21.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/49030","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/49030"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.476602","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.476602"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11054","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11054"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6074","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6074"},{"reference_url":"http://support.apple.com/kb/HT4077","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4077"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0042","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0042"},{"reference_url":"http://www.debian.org/security/2009/dsa-1738","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1738"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0341.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0341.html"},{"reference_url":"http://www.securityfocus.com/archive/1/501757/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/501757/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/504849/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/504849/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/33962","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/33962"},{"reference_url":"http://www.securitytracker.com/id?1021783","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021783"},{"reference_url":"http://www.ubuntu.com/usn/USN-726-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-726-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2009-0009.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2009-0009.html"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0581","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0581"},{"reference_url":"http://www.vupen.com/english/advisories/2009/1865","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/1865"},{"reference_url":"http://www.withdk.com/2009/03/03/curllibcurl-redirect-arbitrary-file-access/","reference_id":"","reference_type":"","scores":[],"url":"http://www.withdk.com/2009/03/03/curllibcurl-redirect-arbitrary-file-access/"},{"reference_url":"http://www.withdk.com/archives/Libcurl_arbitrary_file_access.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://www.withdk.com/archives/Libcurl_arbitrary_file_access.pdf"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=485271","reference_id":"485271","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=485271"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=518423","reference_id":"518423","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=518423"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:5.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:5.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:5.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.1beta:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.1beta:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.1beta:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.15.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.16.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.16.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.16.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.16.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.16.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.16.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.19.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.19.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.19.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:5.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:5.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:5.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.15.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.16.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.16.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.16.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.19.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.19.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.19.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0037","reference_id":"CVE-2009-0037","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0037"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/32834.txt","reference_id":"CVE-2009-0037;OSVDB-53572","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/32834.txt"},{"reference_url":"https://www.securityfocus.com/bid/33962/info","reference_id":"CVE-2009-0037;OSVDB-53572","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/33962/info"},{"reference_url":"https://security.gentoo.org/glsa/200903-21","reference_id":"GLSA-200903-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200903-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0341","reference_id":"RHSA-2009:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0341"},{"reference_url":"https://usn.ubuntu.com/726-1/","reference_id":"USN-726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/726-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585689?format=json","purl":"pkg:deb/debian/curl@7.18.2-8.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.18.2-8.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2009-0037"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2f5z-vxsz-yqdv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77132?format=json","vulnerability_id":"VCID-2szj-xvgq-pkfr","summary":"curl: QUIC certificate check bypass with wolfSSL","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2379.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2379.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2379","reference_id":"","reference_type":"","scores":[{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42501","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42672","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42699","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42641","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42692","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42704","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42726","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42691","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42674","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42735","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42724","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.4266","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00205","scoring_system":"epss","scoring_elements":"0.42584","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2379"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2379","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2379"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/19","reference_id":"19","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/19"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/27/2","reference_id":"2","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/27/2"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/20","reference_id":"20","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270499","reference_id":"2270499","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270499"},{"reference_url":"https://hackerone.com/reports/2410774","reference_id":"2410774","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/"}],"url":"https://hackerone.com/reports/2410774"},{"reference_url":"https://curl.se/docs/CVE-2024-2379.html","reference_id":"CVE-2024-2379.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/"}],"url":"https://curl.se/docs/CVE-2024-2379.html"},{"reference_url":"https://curl.se/docs/CVE-2024-2379.json","reference_id":"CVE-2024-2379.json","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/"}],"url":"https://curl.se/docs/CVE-2024-2379.json"},{"reference_url":"https://support.apple.com/kb/HT214118","reference_id":"HT214118","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/"}],"url":"https://support.apple.com/kb/HT214118"},{"reference_url":"https://support.apple.com/kb/HT214119","reference_id":"HT214119","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/"}],"url":"https://support.apple.com/kb/HT214119"},{"reference_url":"https://support.apple.com/kb/HT214120","reference_id":"HT214120","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/"}],"url":"https://support.apple.com/kb/HT214120"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240531-0001/","reference_id":"ntap-20240531-0001","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T17:42:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240531-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2693","reference_id":"RHSA-2024:2693","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2693"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2694","reference_id":"RHSA-2024:2694","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2694"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584796?format=json","purl":"pkg:deb/debian/curl@8.7.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.7.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2024-2379"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2szj-xvgq-pkfr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47213?format=json","vulnerability_id":"VCID-2vwu-y316-gbb2","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2466.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2466.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2466","reference_id":"","reference_type":"","scores":[{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35078","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35517","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35542","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35424","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.3547","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35495","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35505","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35462","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.3544","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35479","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35468","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35416","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35181","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35159","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2466"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/19","reference_id":"19","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/19"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/20","reference_id":"20","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270497","reference_id":"2270497","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270497"},{"reference_url":"https://hackerone.com/reports/2416725","reference_id":"2416725","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/"}],"url":"https://hackerone.com/reports/2416725"},{"reference_url":"https://curl.se/docs/CVE-2024-2466.html","reference_id":"CVE-2024-2466.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/"}],"url":"https://curl.se/docs/CVE-2024-2466.html"},{"reference_url":"https://curl.se/docs/CVE-2024-2466.json","reference_id":"CVE-2024-2466.json","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/"}],"url":"https://curl.se/docs/CVE-2024-2466.json"},{"reference_url":"https://security.gentoo.org/glsa/202409-20","reference_id":"GLSA-202409-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-20"},{"reference_url":"https://support.apple.com/kb/HT214118","reference_id":"HT214118","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/"}],"url":"https://support.apple.com/kb/HT214118"},{"reference_url":"https://support.apple.com/kb/HT214119","reference_id":"HT214119","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/"}],"url":"https://support.apple.com/kb/HT214119"},{"reference_url":"https://support.apple.com/kb/HT214120","reference_id":"HT214120","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/"}],"url":"https://support.apple.com/kb/HT214120"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240503-0010/","reference_id":"ntap-20240503-0010","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-23T18:43:18Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240503-0010/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2693","reference_id":"RHSA-2024:2693","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2693"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2694","reference_id":"RHSA-2024:2694","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2694"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584796?format=json","purl":"pkg:deb/debian/curl@8.7.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.7.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2024-2466"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2vwu-y316-gbb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49279?format=json","vulnerability_id":"VCID-2xmp-jc8v-bucb","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35252.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35252.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-35252","reference_id":"","reference_type":"","scores":[{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43804","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43779","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43787","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43736","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52318","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52332","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52348","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.5236","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52298","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52356","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58219","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58205","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58912","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-35252"},{"reference_url":"https://curl.se/docs/CVE-2022-35252.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-35252.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35252"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1613943","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"}],"url":"https://hackerone.com/reports/1613943"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018831","reference_id":"1018831","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018831"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jan/20","reference_id":"20","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jan/20"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jan/21","reference_id":"21","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jan/21"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2120718","reference_id":"2120718","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2120718"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://support.apple.com/kb/HT213603","reference_id":"HT213603","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"}],"url":"https://support.apple.com/kb/HT213603"},{"reference_url":"https://support.apple.com/kb/HT213604","reference_id":"HT213604","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"}],"url":"https://support.apple.com/kb/HT213604"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html","reference_id":"msg00028.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220930-0005/","reference_id":"ntap-20220930-0005","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220930-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8840","reference_id":"RHSA-2022:8840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8841","reference_id":"RHSA-2022:8841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2478","reference_id":"RHSA-2023:2478","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2478"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2963","reference_id":"RHSA-2023:2963","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2963"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0428","reference_id":"RHSA-2024:0428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0428"},{"reference_url":"https://usn.ubuntu.com/5587-1/","reference_id":"USN-5587-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5587-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585554?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/585555?format=json","purl":"pkg:deb/debian/curl@7.85.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.85.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2022-35252"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2xmp-jc8v-bucb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49716?format=json","vulnerability_id":"VCID-36n6-qanf-nue8","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow attackers to bypass intended restrictions.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7468.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7468.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7468","reference_id":"","reference_type":"","scores":[{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.65949","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66092","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.65986","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66036","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66048","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66067","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66054","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66024","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66059","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66073","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66062","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66083","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66094","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.65991","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66019","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7468"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7468","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7468"},{"reference_url":"https://curl.haxx.se/docs/adv_20170419.html","reference_id":"","reference_type":"","scores":[],"url":"https://curl.haxx.se/docs/adv_20170419.html"},{"reference_url":"https://curl.se/docs/CVE-2017-7468.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2017-7468.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7468","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7468"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securityfocus.com/bid/97962","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97962"},{"reference_url":"http://www.securitytracker.com/id/1038341","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1038341"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443381","reference_id":"1443381","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443381"},{"reference_url":"https://security.archlinux.org/ASA-201704-12","reference_id":"ASA-201704-12","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201704-12"},{"reference_url":"https://security.archlinux.org/AVG-180","reference_id":"AVG-180","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-180"},{"reference_url":"https://security.archlinux.org/AVG-181","reference_id":"AVG-181","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-181"},{"reference_url":"https://security.archlinux.org/AVG-183","reference_id":"AVG-183","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-183"},{"reference_url":"https://security.archlinux.org/AVG-184","reference_id":"AVG-184","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-184"},{"reference_url":"https://security.archlinux.org/AVG-241","reference_id":"AVG-241","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-241"},{"reference_url":"https://security.archlinux.org/AVG-243","reference_id":"AVG-243","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-243"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7468","reference_id":"CVE-2017-7468","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"},{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7468"},{"reference_url":"https://security.gentoo.org/glsa/201709-14","reference_id":"GLSA-201709-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-14"},{"reference_url":"https://usn.ubuntu.com/3262-1/","reference_id":"USN-3262-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3262-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585386?format=json","purl":"pkg:deb/debian/curl@7.52.1-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.52.1-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2017-7468"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-36n6-qanf-nue8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61670?format=json","vulnerability_id":"VCID-38mv-usbe-z7hd","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22901.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22901.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22901","reference_id":"","reference_type":"","scores":[{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43576","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43716","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43654","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43658","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.56921","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57065","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57062","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57018","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.5704","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57017","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57068","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.5707","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57081","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.5706","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57036","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22901"},{"reference_url":"https://curl.se/docs/CVE-2021-22901.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2021-22901.html"},{"reference_url":"https://hackerone.com/reports/1180380","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/1180380"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1963146","reference_id":"1963146","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1963146"},{"reference_url":"https://security.archlinux.org/ASA-202106-4","reference_id":"ASA-202106-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-4"},{"reference_url":"https://security.archlinux.org/ASA-202106-5","reference_id":"ASA-202106-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-5"},{"reference_url":"https://security.archlinux.org/ASA-202106-6","reference_id":"ASA-202106-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-6"},{"reference_url":"https://security.archlinux.org/ASA-202106-7","reference_id":"ASA-202106-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-7"},{"reference_url":"https://security.archlinux.org/AVG-1995","reference_id":"AVG-1995","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1995"},{"reference_url":"https://security.archlinux.org/AVG-1996","reference_id":"AVG-1996","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1996"},{"reference_url":"https://security.archlinux.org/AVG-1997","reference_id":"AVG-1997","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1997"},{"reference_url":"https://security.archlinux.org/AVG-1998","reference_id":"AVG-1998","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1998"},{"reference_url":"https://security.gentoo.org/glsa/202105-36","reference_id":"GLSA-202105-36","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202105-36"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2471","reference_id":"RHSA-2021:2471","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2471"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2472","reference_id":"RHSA-2021:2472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2472"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2021-22901"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-38mv-usbe-z7hd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/354616?format=json","vulnerability_id":"VCID-3qck-hm3c-tqaq","summary":"","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4873.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4873.json"},{"reference_url":"https://curl.se/docs/CVE-2026-4873.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2026-4873.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4873"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/3621851","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/3621851"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2461200","reference_id":"2461200","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2461200"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:12916","reference_id":"RHSA-2026:12916","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:12916"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2026-4873"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3qck-hm3c-tqaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49266?format=json","vulnerability_id":"VCID-3sy2-4f3g-zkac","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27774.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27774.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27774","reference_id":"","reference_type":"","scores":[{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53835","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53855","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53749","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53775","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53748","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53801","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53799","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53847","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.5383","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53851","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53814","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54535","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54541","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54556","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27774"},{"reference_url":"https://curl.se/docs/CVE-2022-27774.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-27774.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1543773","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:41:23Z/"}],"url":"https://hackerone.com/reports/1543773"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010254","reference_id":"1010254","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010254"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077547","reference_id":"2077547","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077547"},{"reference_url":"https://security.archlinux.org/AVG-2685","reference_id":"AVG-2685","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2685"},{"reference_url":"https://www.debian.org/security/2022/dsa-5197","reference_id":"dsa-5197","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:41:23Z/"}],"url":"https://www.debian.org/security/2022/dsa-5197"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:41:23Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html","reference_id":"msg00028.html","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:41:23Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220609-0008/","reference_id":"ntap-20220609-0008","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:41:23Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220609-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5245","reference_id":"RHSA-2022:5245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5313","reference_id":"RHSA-2022:5313","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5313"},{"reference_url":"https://usn.ubuntu.com/5397-1/","reference_id":"USN-5397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5397-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582658?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582659?format=json","purl":"pkg:deb/debian/curl@7.83.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2022-27774"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3sy2-4f3g-zkac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57268?format=json","vulnerability_id":"VCID-47qb-2qkw-1qej","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28321.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28321.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28321","reference_id":"","reference_type":"","scores":[{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50659","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50695","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50746","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50704","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.52991","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.52966","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53064","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53057","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.5302","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53037","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53052","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53003","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53009","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.52959","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28321"},{"reference_url":"https://curl.se/docs/CVE-2023-28321.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-28321.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1950627","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://hackerone.com/reports/1950627"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239","reference_id":"1036239","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196786","reference_id":"2196786","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196786"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/47","reference_id":"47","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/47"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/48","reference_id":"48","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/48"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/52","reference_id":"52","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/52"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/","reference_id":"F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://support.apple.com/kb/HT213843","reference_id":"HT213843","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://support.apple.com/kb/HT213843"},{"reference_url":"https://support.apple.com/kb/HT213844","reference_id":"HT213844","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://support.apple.com/kb/HT213844"},{"reference_url":"https://support.apple.com/kb/HT213845","reference_id":"HT213845","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://support.apple.com/kb/HT213845"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html","reference_id":"msg00016.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230609-0009/","reference_id":"ntap-20230609-0009","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230609-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4354","reference_id":"RHSA-2023:4354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4354"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4523","reference_id":"RHSA-2023:4523","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4523"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4628","reference_id":"RHSA-2023:4628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4629","reference_id":"RHSA-2023:4629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5598","reference_id":"RHSA-2023:5598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6292","reference_id":"RHSA-2023:6292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6292"},{"reference_url":"https://usn.ubuntu.com/6237-1/","reference_id":"USN-6237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6237-1/"},{"reference_url":"https://usn.ubuntu.com/6237-3/","reference_id":"USN-6237-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6237-3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/","reference_id":"Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583791?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583792?format=json","purl":"pkg:deb/debian/curl@7.88.1-10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2023-28321"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-47qb-2qkw-1qej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56919?format=json","vulnerability_id":"VCID-4drq-2td7-akbk","summary":"cURL is vulnerable to a buffer overflow which could lead to the execution\n    of arbitrary code.","references":[{"reference_url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt"},{"reference_url":"http://docs.info.apple.com/article.html?artnum=302847","reference_id":"","reference_type":"","scores":[],"url":"http://docs.info.apple.com/article.html?artnum=302847"},{"reference_url":"http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3185.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3185.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3185","reference_id":"","reference_type":"","scores":[{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89571","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89504","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89552","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89567","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89508","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89519","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.8952","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89536","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89539","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89547","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89544","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89553","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89555","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3185"},{"reference_url":"https://curl.se/docs/CVE-2005-3185.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2005-3185.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185"},{"reference_url":"http://secunia.com/advisories/17192","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17192"},{"reference_url":"http://secunia.com/advisories/17193","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17193"},{"reference_url":"http://secunia.com/advisories/17203","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17203"},{"reference_url":"http://secunia.com/advisories/17208","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17208"},{"reference_url":"http://secunia.com/advisories/17228","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17228"},{"reference_url":"http://secunia.com/advisories/17247","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17247"},{"reference_url":"http://secunia.com/advisories/17297","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17297"},{"reference_url":"http://secunia.com/advisories/17320","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17320"},{"reference_url":"http://secunia.com/advisories/17400","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17400"},{"reference_url":"http://secunia.com/advisories/17403","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17403"},{"reference_url":"http://secunia.com/advisories/17485","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17485"},{"reference_url":"http://secunia.com/advisories/17813","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17813"},{"reference_url":"http://secunia.com/advisories/17965","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17965"},{"reference_url":"http://secunia.com/advisories/19193","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19193"},{"reference_url":"http://securityreason.com/securityalert/82","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/82"},{"reference_url":"http://securitytracker.com/id?1015056","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1015056"},{"reference_url":"http://securitytracker.com/id?1015057","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1015057"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/22721","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/22721"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.519010","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.519010"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810"},{"reference_url":"http://www.debian.org/security/2005/dsa-919","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-919"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml"},{"reference_url":"http://www.idefense.com/application/poi/display?id=322&type=vulnerabilities","reference_id":"","reference_type":"","scores":[],"url":"http://www.idefense.com/application/poi/display?id=322&type=vulnerabilities"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:182","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:182"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html"},{"reference_url":"http://www.osvdb.org/20011","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/20011"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-807.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-807.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-812.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-812.html"},{"reference_url":"http://www.securityfocus.com/bid/15102","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/15102"},{"reference_url":"http://www.securityfocus.com/bid/15647","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/15647"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2088","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2088"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2125","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2125"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2659","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2659"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617794","reference_id":"1617794","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617794"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=333734","reference_id":"333734","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=333734"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libcurl:libcurl:7.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libcurl:libcurl:7.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libcurl:libcurl:7.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wget:wget:1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wget:wget:1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wget:wget:1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3185","reference_id":"CVE-2005-3185","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3185"},{"reference_url":"https://security.gentoo.org/glsa/200510-19","reference_id":"GLSA-200510-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200510-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:807","reference_id":"RHSA-2005:807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:812","reference_id":"RHSA-2005:812","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:812"},{"reference_url":"https://usn.ubuntu.com/205-1/","reference_id":"USN-205-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/205-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586648?format=json","purl":"pkg:deb/debian/curl@7.15.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.15.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2005-3185"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4drq-2td7-akbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57260?format=json","vulnerability_id":"VCID-4e1k-7bj9-hfch","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23914.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23914.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-23914","reference_id":"","reference_type":"","scores":[{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31527","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31992","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31995","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31955","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31922","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31934","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31906","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31738","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31611","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.32048","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.32088","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31911","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31963","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-23914"},{"reference_url":"https://curl.se/docs/CVE-2023-23914.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-23914.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23914","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23914"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1813864","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-03-12T18:51:37Z/"}],"url":"https://hackerone.com/reports/1813864"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031371","reference_id":"1031371","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031371"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2167797","reference_id":"2167797","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2167797"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-03-12T18:51:37Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230309-0006/","reference_id":"ntap-20230309-0006","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-03-12T18:51:37Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230309-0006/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3354","reference_id":"RHSA-2023:3354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3354"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3355","reference_id":"RHSA-2023:3355","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3355"},{"reference_url":"https://usn.ubuntu.com/5891-1/","reference_id":"USN-5891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5891-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586101?format=json","purl":"pkg:deb/debian/curl@7.88.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2023-23914"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4e1k-7bj9-hfch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57261?format=json","vulnerability_id":"VCID-4gze-cwtp-2bgr","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23915.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23915.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-23915","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13737","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1393","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13894","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13846","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13754","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13749","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13823","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13848","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13821","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13978","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14033","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13836","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1392","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13973","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-23915"},{"reference_url":"https://curl.se/docs/CVE-2023-23915.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-23915.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23915","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23915"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1814333","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/1814333"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031371","reference_id":"1031371","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031371"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2167813","reference_id":"2167813","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2167813"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:46:29Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230309-0006/","reference_id":"ntap-20230309-0006","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:46:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230309-0006/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3354","reference_id":"RHSA-2023:3354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3354"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3355","reference_id":"RHSA-2023:3355","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3355"},{"reference_url":"https://usn.ubuntu.com/5891-1/","reference_id":"USN-5891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5891-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586101?format=json","purl":"pkg:deb/debian/curl@7.88.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2023-23915"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4gze-cwtp-2bgr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46649?format=json","vulnerability_id":"VCID-4mcy-vzmg-mbhz","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which might allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0036.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0036.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0036","reference_id":"","reference_type":"","scores":[{"value":"0.10342","scoring_system":"epss","scoring_elements":"0.9322","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10342","scoring_system":"epss","scoring_elements":"0.93159","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10342","scoring_system":"epss","scoring_elements":"0.93168","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10342","scoring_system":"epss","scoring_elements":"0.93173","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10342","scoring_system":"epss","scoring_elements":"0.93171","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10342","scoring_system":"epss","scoring_elements":"0.93179","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10342","scoring_system":"epss","scoring_elements":"0.93184","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10342","scoring_system":"epss","scoring_elements":"0.93189","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10342","scoring_system":"epss","scoring_elements":"0.93187","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10342","scoring_system":"epss","scoring_elements":"0.93188","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10342","scoring_system":"epss","scoring_elements":"0.93204","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10342","scoring_system":"epss","scoring_elements":"0.93209","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10342","scoring_system":"epss","scoring_elements":"0.93217","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10342","scoring_system":"epss","scoring_elements":"0.93222","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0036"},{"reference_url":"https://curl.se/docs/CVE-2012-0036.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2012-0036.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0036","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0036"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=773457","reference_id":"773457","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=773457"},{"reference_url":"https://security.gentoo.org/glsa/201203-02","reference_id":"GLSA-201203-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201203-02"},{"reference_url":"https://usn.ubuntu.com/1346-1/","reference_id":"USN-1346-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1346-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582527?format=json","purl":"pkg:deb/debian/curl@7.24.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.24.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2012-0036"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4mcy-vzmg-mbhz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51947?format=json","vulnerability_id":"VCID-4mk9-5buz-puh5","summary":"Multiple vulnerabilities have been discovered in cURL, the worst of\n    which could lead to man-in-the-middle attacks.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0139.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0139.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0139","reference_id":"","reference_type":"","scores":[{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.79009","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78884","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78891","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78919","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78902","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78927","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78933","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78941","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78931","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.7896","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78957","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78986","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78993","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0139"},{"reference_url":"https://curl.se/docs/CVE-2014-0139.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2014-0139.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1079149","reference_id":"1079149","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1079149"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742728","reference_id":"742728","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742728"},{"reference_url":"https://security.gentoo.org/glsa/201406-21","reference_id":"GLSA-201406-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-21"},{"reference_url":"https://usn.ubuntu.com/2167-1/","reference_id":"USN-2167-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2167-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585465?format=json","purl":"pkg:deb/debian/curl@7.36.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.36.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2014-0139"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4mk9-5buz-puh5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47209?format=json","vulnerability_id":"VCID-4seq-hvbx-7fg8","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46219.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46219.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46219","reference_id":"","reference_type":"","scores":[{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42211","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42478","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.4244","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.4241","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42459","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42434","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42362","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42298","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42295","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00221","scoring_system":"epss","scoring_elements":"0.44713","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00221","scoring_system":"epss","scoring_elements":"0.44703","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00221","scoring_system":"epss","scoring_elements":"0.44716","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00221","scoring_system":"epss","scoring_elements":"0.44723","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00221","scoring_system":"epss","scoring_elements":"0.4466","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46219"},{"reference_url":"https://curl.se/docs/CVE-2023-46219.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:01:11Z/"}],"url":"https://curl.se/docs/CVE-2023-46219.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46219","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46219"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/2236133","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:01:11Z/"}],"url":"https://hackerone.com/reports/2236133"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057645","reference_id":"1057645","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057645"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2252034","reference_id":"2252034","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2252034"},{"reference_url":"https://www.debian.org/security/2023/dsa-5587","reference_id":"dsa-5587","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:01:11Z/"}],"url":"https://www.debian.org/security/2023/dsa-5587"},{"reference_url":"https://security.gentoo.org/glsa/202409-20","reference_id":"GLSA-202409-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-20"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240119-0007/","reference_id":"ntap-20240119-0007","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:01:11Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240119-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1316","reference_id":"RHSA-2024:1316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1317","reference_id":"RHSA-2024:1317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1317"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD/","reference_id":"UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:01:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD/"},{"reference_url":"https://usn.ubuntu.com/6535-1/","reference_id":"USN-6535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6535-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/587037?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/587038?format=json","purl":"pkg:deb/debian/curl@8.5.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.5.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2023-46219"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4seq-hvbx-7fg8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49712?format=json","vulnerability_id":"VCID-549m-sm8g-cude","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow attackers to bypass intended restrictions.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000099.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000099.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000099","reference_id":"","reference_type":"","scores":[{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.72962","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73111","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73021","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73046","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73025","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73019","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73061","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.7307","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73064","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73103","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73113","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.72974","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.72994","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.7297","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73007","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000099"},{"reference_url":"https://curl.haxx.se/0809C.patch","reference_id":"","reference_type":"","scores":[],"url":"https://curl.haxx.se/0809C.patch"},{"reference_url":"https://curl.haxx.se/docs/adv_20170809C.html","reference_id":"","reference_type":"","scores":[],"url":"https://curl.haxx.se/docs/adv_20170809C.html"},{"reference_url":"https://curl.se/docs/CVE-2017-1000099.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2017-1000099.html"},{"reference_url":"http://www.securityfocus.com/bid/100281","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/100281"},{"reference_url":"http://www.securitytracker.com/id/1039119","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039119"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1478316","reference_id":"1478316","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1478316"},{"reference_url":"https://security.archlinux.org/ASA-201708-16","reference_id":"ASA-201708-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201708-16"},{"reference_url":"https://security.archlinux.org/ASA-201710-3","reference_id":"ASA-201710-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-3"},{"reference_url":"https://security.archlinux.org/ASA-201710-4","reference_id":"ASA-201710-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-4"},{"reference_url":"https://security.archlinux.org/ASA-201710-5","reference_id":"ASA-201710-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-5"},{"reference_url":"https://security.archlinux.org/ASA-201710-6","reference_id":"ASA-201710-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-6"},{"reference_url":"https://security.archlinux.org/ASA-201710-7","reference_id":"ASA-201710-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-7"},{"reference_url":"https://security.archlinux.org/AVG-370","reference_id":"AVG-370","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-370"},{"reference_url":"https://security.archlinux.org/AVG-371","reference_id":"AVG-371","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-371"},{"reference_url":"https://security.archlinux.org/AVG-386","reference_id":"AVG-386","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-386"},{"reference_url":"https://security.archlinux.org/AVG-387","reference_id":"AVG-387","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-387"},{"reference_url":"https://security.archlinux.org/AVG-388","reference_id":"AVG-388","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-388"},{"reference_url":"https://security.archlinux.org/AVG-389","reference_id":"AVG-389","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-389"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000099","reference_id":"CVE-2017-1000099","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000099"},{"reference_url":"https://security.gentoo.org/glsa/201709-14","reference_id":"GLSA-201709-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201709-14"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2017-1000099"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-549m-sm8g-cude"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49259?format=json","vulnerability_id":"VCID-56wg-yafz-gkgx","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22922.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22922.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22922","reference_id":"","reference_type":"","scores":[{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34891","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34648","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35088","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35115","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34995","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35039","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35067","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35071","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35036","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35012","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.3505","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35035","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34988","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34757","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34738","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22922"},{"reference_url":"https://curl.se/docs/CVE-2021-22922.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2021-22922.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22922"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1213175","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/"}],"url":"https://hackerone.com/reports/1213175"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1981435","reference_id":"1981435","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1981435"},{"reference_url":"https://security.archlinux.org/ASA-202107-59","reference_id":"ASA-202107-59","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-59"},{"reference_url":"https://security.archlinux.org/AVG-2194","reference_id":"AVG-2194","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2194"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/","reference_id":"FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210902-0003/","reference_id":"ntap-20210902-0003","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210902-0003/"},{"reference_url":"https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E","reference_id":"r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/"}],"url":"https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E","reference_id":"r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/"}],"url":"https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E","reference_id":"rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/"}],"url":"https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E","reference_id":"rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:09:24Z/"}],"url":"https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3582","reference_id":"RHSA-2021:3582","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3582"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3903","reference_id":"RHSA-2021:3903","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3903"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584001?format=json","purl":"pkg:deb/debian/curl@7.79.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.79.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2021-22922"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-56wg-yafz-gkgx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64428?format=json","vulnerability_id":"VCID-5g4v-dyse-uucu","summary":"wcurl: wcurl: Arbitrary file placement via crafted URLs","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11563.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11563.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11563","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0412","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04304","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04108","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04116","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04239","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0425","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04269","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04138","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04155","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04186","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04201","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0418","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04163","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04137","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-11563"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2442571","reference_id":"2442571","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2442571"},{"reference_url":"https://curl.se/docs/CVE-2025-11563.html","reference_id":"CVE-2025-11563.html","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-25T18:53:51Z/"}],"url":"https://curl.se/docs/CVE-2025-11563.html"},{"reference_url":"https://curl.se/docs/CVE-2025-11563.json","reference_id":"CVE-2025-11563.json","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-25T18:53:51Z/"}],"url":"https://curl.se/docs/CVE-2025-11563.json"},{"reference_url":"https://usn.ubuntu.com/8062-1/","reference_id":"USN-8062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8062-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584612?format=json","purl":"pkg:deb/debian/curl@8.17.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.17.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2025-11563"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5g4v-dyse-uucu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34703?format=json","vulnerability_id":"VCID-5jan-pqf6-fyhr","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8622.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8622.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8622","reference_id":"","reference_type":"","scores":[{"value":"0.01634","scoring_system":"epss","scoring_elements":"0.81901","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01634","scoring_system":"epss","scoring_elements":"0.81908","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01634","scoring_system":"epss","scoring_elements":"0.81927","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01634","scoring_system":"epss","scoring_elements":"0.81915","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01634","scoring_system":"epss","scoring_elements":"0.81911","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01634","scoring_system":"epss","scoring_elements":"0.81947","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01634","scoring_system":"epss","scoring_elements":"0.81987","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01634","scoring_system":"epss","scoring_elements":"0.81845","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01634","scoring_system":"epss","scoring_elements":"0.81856","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01634","scoring_system":"epss","scoring_elements":"0.81879","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01634","scoring_system":"epss","scoring_elements":"0.81875","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01634","scoring_system":"epss","scoring_elements":"0.81948","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01634","scoring_system":"epss","scoring_elements":"0.81971","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01634","scoring_system":"epss","scoring_elements":"0.81982","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8622"},{"reference_url":"https://curl.se/docs/CVE-2016-8622.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8622.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037192","reference_id":"1037192","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:54:47Z/"}],"url":"http://www.securitytracker.com/id/1037192"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388386","reference_id":"1388386","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388386"},{"reference_url":"http://www.securityfocus.com/bid/94105","reference_id":"94105","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:54:47Z/"}],"url":"http://www.securityfocus.com/bid/94105"},{"reference_url":"https://curl.haxx.se/docs/adv_20161102H.html","reference_id":"adv_20161102H.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:54:47Z/"}],"url":"https://curl.haxx.se/docs/adv_20161102H.html"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:54:47Z/"}],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622","reference_id":"show_bug.cgi?id=CVE-2016-8622","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:54:47Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8622"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583608?format=json","purl":"pkg:deb/debian/curl@7.51.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-8622"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5jan-pqf6-fyhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34390?format=json","vulnerability_id":"VCID-5n7a-9j23-e7dj","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16839.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16839.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16839","reference_id":"","reference_type":"","scores":[{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52577","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52709","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52659","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52664","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52613","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52647","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.5262","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58476","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58515","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58495","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58527","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58532","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58511","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58477","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58488","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16839"},{"reference_url":"https://curl.se/docs/CVE-2018-16839.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2018-16839.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16839"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1042012","reference_id":"1042012","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:57:02Z/"}],"url":"http://www.securitytracker.com/id/1042012"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1642201","reference_id":"1642201","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1642201"},{"reference_url":"https://security.archlinux.org/ASA-201811-7","reference_id":"ASA-201811-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201811-7"},{"reference_url":"https://security.archlinux.org/ASA-201811-8","reference_id":"ASA-201811-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201811-8"},{"reference_url":"https://security.archlinux.org/ASA-201811-9","reference_id":"ASA-201811-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201811-9"},{"reference_url":"https://security.archlinux.org/AVG-796","reference_id":"AVG-796","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-796"},{"reference_url":"https://security.archlinux.org/AVG-797","reference_id":"AVG-797","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-797"},{"reference_url":"https://security.archlinux.org/AVG-798","reference_id":"AVG-798","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-798"},{"reference_url":"https://curl.haxx.se/docs/CVE-2018-16839.html","reference_id":"CVE-2018-16839.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:57:02Z/"}],"url":"https://curl.haxx.se/docs/CVE-2018-16839.html"},{"reference_url":"https://www.debian.org/security/2018/dsa-4331","reference_id":"dsa-4331","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:57:02Z/"}],"url":"https://www.debian.org/security/2018/dsa-4331"},{"reference_url":"https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5","reference_id":"f3a24d7916b9173c69a3e0ee790102993833d6c5","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:57:02Z/"}],"url":"https://github.com/curl/curl/commit/f3a24d7916b9173c69a3e0ee790102993833d6c5"},{"reference_url":"https://security.gentoo.org/glsa/201903-03","reference_id":"GLSA-201903-03","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:57:02Z/"}],"url":"https://security.gentoo.org/glsa/201903-03"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16839","reference_id":"show_bug.cgi?id=CVE-2018-16839","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:57:02Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16839"},{"reference_url":"https://usn.ubuntu.com/3805-1/","reference_id":"USN-3805-1","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:57:02Z/"}],"url":"https://usn.ubuntu.com/3805-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583784?format=json","purl":"pkg:deb/debian/curl@7.62.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.62.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2018-16839"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5n7a-9j23-e7dj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/97810?format=json","vulnerability_id":"VCID-5xp7-mcsa-uqd4","summary":"When doing TLS related transfers with reused easy or multi handles and\naltering the  `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally\nreuse a CA store cached in memory for which the partial chain option was\nreversed. Contrary to the user's wishes and expectations. This could make\nlibcurl find and accept a trust chain that it otherwise would not.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14819.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14819.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-14819","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13995","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13755","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13863","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13771","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13766","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1384","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13866","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13839","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1405","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13854","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13938","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13991","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13948","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13911","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-14819"},{"reference_url":"https://curl.se/docs/CVE-2025-14819.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T15:00:02Z/"}],"url":"https://curl.se/docs/CVE-2025-14819.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426408","reference_id":"2426408","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426408"},{"reference_url":"https://curl.se/docs/CVE-2025-14819.json","reference_id":"CVE-2025-14819.json","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T15:00:02Z/"}],"url":"https://curl.se/docs/CVE-2025-14819.json"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6893","reference_id":"RHSA-2026:6893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6893"},{"reference_url":"https://usn.ubuntu.com/8062-1/","reference_id":"USN-8062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8062-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921944?format=json","purl":"pkg:deb/debian/curl@8.18.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.18.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2025-14819"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5xp7-mcsa-uqd4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49269?format=json","vulnerability_id":"VCID-6ge5-86tg-dydf","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27779.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27779.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27779","reference_id":"","reference_type":"","scores":[{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50628","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50717","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50665","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50673","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50654","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.5068","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50635","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.5069","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50686","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50728","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50705","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50731","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50737","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27779"},{"reference_url":"https://curl.se/docs/CVE-2022-27779.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-27779.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1553301","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/1553301"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082202","reference_id":"2082202","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082202"},{"reference_url":"https://security.archlinux.org/AVG-2706","reference_id":"AVG-2706","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2706"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202212-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582920?format=json","purl":"pkg:deb/debian/curl@7.83.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2022-27779"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6ge5-86tg-dydf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34697?format=json","vulnerability_id":"VCID-6muy-xpdq-9kg8","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8616.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8616.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8616","reference_id":"","reference_type":"","scores":[{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88589","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88673","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.8864","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88652","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88645","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88658","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88655","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88653","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88668","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88674","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88598","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88616","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88617","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88635","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8616"},{"reference_url":"https://curl.se/docs/CVE-2016-8616.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8616.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388371","reference_id":"1388371","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388371"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583608?format=json","purl":"pkg:deb/debian/curl@7.51.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-8616"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6muy-xpdq-9kg8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71914?format=json","vulnerability_id":"VCID-6we4-n888-6qhe","summary":"libcurl: Buffer Overflow in libcurl via zlib Integer Overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0725.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0725.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0725","reference_id":"","reference_type":"","scores":[{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63322","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63305","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63314","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.6327","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63867","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63788","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63815","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63772","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63823","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.6384","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63856","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63869","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0725"},{"reference_url":"https://curl.se/docs/CVE-2025-0725.html","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-05T14:33:50Z/"}],"url":"https://curl.se/docs/CVE-2025-0725.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0725","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0725"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/2956023","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-05T14:33:50Z/"}],"url":"https://hackerone.com/reports/2956023"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2343899","reference_id":"2343899","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2343899"},{"reference_url":"https://curl.se/docs/CVE-2025-0725.json","reference_id":"CVE-2025-0725.json","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-05T14:33:50Z/"}],"url":"https://curl.se/docs/CVE-2025-0725.json"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582847?format=json","purl":"pkg:deb/debian/curl@8.12.0%2Bgit20250209.89ed161%2Bds-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.12.0%252Bgit20250209.89ed161%252Bds-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2025-0725"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6we4-n888-6qhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49700?format=json","vulnerability_id":"VCID-6yb7-t8qs-cbch","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000007.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000007.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000007","reference_id":"","reference_type":"","scores":[{"value":"0.03344","scoring_system":"epss","scoring_elements":"0.87259","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03344","scoring_system":"epss","scoring_elements":"0.87285","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03344","scoring_system":"epss","scoring_elements":"0.87269","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03344","scoring_system":"epss","scoring_elements":"0.87283","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03344","scoring_system":"epss","scoring_elements":"0.87302","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03871","scoring_system":"epss","scoring_elements":"0.88245","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03871","scoring_system":"epss","scoring_elements":"0.88227","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03871","scoring_system":"epss","scoring_elements":"0.88238","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03871","scoring_system":"epss","scoring_elements":"0.88231","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03871","scoring_system":"epss","scoring_elements":"0.88244","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03871","scoring_system":"epss","scoring_elements":"0.88263","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03871","scoring_system":"epss","scoring_elements":"0.88268","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03871","scoring_system":"epss","scoring_elements":"0.8827","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000007"},{"reference_url":"https://curl.se/docs/CVE-2018-1000007.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2018-1000007.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1537125","reference_id":"1537125","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1537125"},{"reference_url":"https://security.archlinux.org/ASA-201801-20","reference_id":"ASA-201801-20","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-20"},{"reference_url":"https://security.archlinux.org/ASA-201801-22","reference_id":"ASA-201801-22","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-22"},{"reference_url":"https://security.archlinux.org/ASA-201801-23","reference_id":"ASA-201801-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-23"},{"reference_url":"https://security.archlinux.org/ASA-201801-24","reference_id":"ASA-201801-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-24"},{"reference_url":"https://security.archlinux.org/ASA-201801-25","reference_id":"ASA-201801-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-25"},{"reference_url":"https://security.archlinux.org/ASA-201801-26","reference_id":"ASA-201801-26","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-26"},{"reference_url":"https://security.archlinux.org/AVG-593","reference_id":"AVG-593","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-593"},{"reference_url":"https://security.archlinux.org/AVG-594","reference_id":"AVG-594","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-594"},{"reference_url":"https://security.archlinux.org/AVG-595","reference_id":"AVG-595","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-595"},{"reference_url":"https://security.archlinux.org/AVG-596","reference_id":"AVG-596","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-596"},{"reference_url":"https://security.archlinux.org/AVG-597","reference_id":"AVG-597","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-597"},{"reference_url":"https://security.archlinux.org/AVG-598","reference_id":"AVG-598","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-598"},{"reference_url":"https://security.gentoo.org/glsa/201804-04","reference_id":"GLSA-201804-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-04"},{"reference_url":"https://usn.ubuntu.com/3554-1/","reference_id":"USN-3554-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3554-1/"},{"reference_url":"https://usn.ubuntu.com/3554-2/","reference_id":"USN-3554-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3554-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585653?format=json","purl":"pkg:deb/debian/curl@7.58.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.58.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2018-1000007"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6yb7-t8qs-cbch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74464?format=json","vulnerability_id":"VCID-75nw-4e2d-zqgg","summary":"curl: libcurl: ASN.1 date parser overread","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7264.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7264.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7264","reference_id":"","reference_type":"","scores":[{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.73973","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.73947","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.73943","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.73978","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00796","scoring_system":"epss","scoring_elements":"0.74029","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75443","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75472","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75409","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75429","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75407","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75396","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75437","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75476","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00882","scoring_system":"epss","scoring_elements":"0.75467","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7264"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7264","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7264"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/31/1","reference_id":"1","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T20:05:41Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/31/1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077656","reference_id":"1077656","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1077656"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2301888","reference_id":"2301888","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2301888"},{"reference_url":"https://hackerone.com/reports/2629968","reference_id":"2629968","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T20:05:41Z/"}],"url":"https://hackerone.com/reports/2629968"},{"reference_url":"https://curl.se/docs/CVE-2024-7264.html","reference_id":"CVE-2024-7264.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T20:05:41Z/"}],"url":"https://curl.se/docs/CVE-2024-7264.html"},{"reference_url":"https://curl.se/docs/CVE-2024-7264.json","reference_id":"CVE-2024-7264.json","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-01T20:05:41Z/"}],"url":"https://curl.se/docs/CVE-2024-7264.json"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7726","reference_id":"RHSA-2024:7726","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/6944-1/","reference_id":"USN-6944-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6944-1/"},{"reference_url":"https://usn.ubuntu.com/6944-2/","reference_id":"USN-6944-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6944-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583098?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583099?format=json","purl":"pkg:deb/debian/curl@8.9.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.9.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2024-7264"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-75nw-4e2d-zqgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34393?format=json","vulnerability_id":"VCID-79sv-kzb5-hbc4","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3822.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3822.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3822","reference_id":"","reference_type":"","scores":[{"value":"0.16566","scoring_system":"epss","scoring_elements":"0.94923","published_at":"2026-04-16T12:55:00Z"},{"value":"0.16566","scoring_system":"epss","scoring_elements":"0.94916","published_at":"2026-04-13T12:55:00Z"},{"value":"0.16566","scoring_system":"epss","scoring_elements":"0.94913","published_at":"2026-04-12T12:55:00Z"},{"value":"0.16566","scoring_system":"epss","scoring_elements":"0.94927","published_at":"2026-04-18T12:55:00Z"},{"value":"0.16566","scoring_system":"epss","scoring_elements":"0.94931","published_at":"2026-04-29T12:55:00Z"},{"value":"0.16566","scoring_system":"epss","scoring_elements":"0.94911","published_at":"2026-04-11T12:55:00Z"},{"value":"0.16566","scoring_system":"epss","scoring_elements":"0.94888","published_at":"2026-04-02T12:55:00Z"},{"value":"0.16566","scoring_system":"epss","scoring_elements":"0.94891","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16566","scoring_system":"epss","scoring_elements":"0.94893","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16566","scoring_system":"epss","scoring_elements":"0.94907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.16566","scoring_system":"epss","scoring_elements":"0.94902","published_at":"2026-04-08T12:55:00Z"},{"value":"0.16566","scoring_system":"epss","scoring_elements":"0.94879","published_at":"2026-04-01T12:55:00Z"},{"value":"0.16566","scoring_system":"epss","scoring_elements":"0.94932","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3822"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3822","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3822"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"}],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf"},{"reference_url":"https://curl.haxx.se/docs/CVE-2019-3822.html","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"}],"url":"https://curl.haxx.se/docs/CVE-2019-3822.html"},{"reference_url":"https://curl.se/docs/CVE-2019-3822.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2019-3822.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"}],"url":"https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190315-0001/","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20190315-0001/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190719-0004/","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20190719-0004/"},{"reference_url":"https://support.f5.com/csp/article/K84141449","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"}],"url":"https://support.f5.com/csp/article/K84141449"},{"reference_url":"https://support.f5.com/csp/article/K84141449?utm_source=f5support&amp%3Butm_medium=RSS","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"}],"url":"https://support.f5.com/csp/article/K84141449?utm_source=f5support&amp%3Butm_medium=RSS"},{"reference_url":"https://www.debian.org/security/2019/dsa-4386","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"}],"url":"https://www.debian.org/security/2019/dsa-4386"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"}],"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"}],"url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"reference_url":"http://www.securityfocus.com/bid/106950","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"}],"url":"http://www.securityfocus.com/bid/106950"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1670254","reference_id":"1670254","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1670254"},{"reference_url":"https://security.archlinux.org/ASA-201902-10","reference_id":"ASA-201902-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201902-10"},{"reference_url":"https://security.archlinux.org/ASA-201902-11","reference_id":"ASA-201902-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201902-11"},{"reference_url":"https://security.archlinux.org/ASA-201902-12","reference_id":"ASA-201902-12","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201902-12"},{"reference_url":"https://security.archlinux.org/ASA-201902-13","reference_id":"ASA-201902-13","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201902-13"},{"reference_url":"https://security.archlinux.org/ASA-201902-9","reference_id":"ASA-201902-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201902-9"},{"reference_url":"https://security.archlinux.org/AVG-873","reference_id":"AVG-873","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-873"},{"reference_url":"https://security.archlinux.org/AVG-874","reference_id":"AVG-874","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-874"},{"reference_url":"https://security.archlinux.org/AVG-875","reference_id":"AVG-875","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-875"},{"reference_url":"https://security.archlinux.org/AVG-876","reference_id":"AVG-876","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-876"},{"reference_url":"https://security.archlinux.org/AVG-877","reference_id":"AVG-877","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-877"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:services_tools_bundle:19.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:services_tools_bundle:19.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:services_tools_bundle:19.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3822","reference_id":"CVE-2019-3822","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3822"},{"reference_url":"https://security.gentoo.org/glsa/201903-03","reference_id":"GLSA-201903-03","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"}],"url":"https://security.gentoo.org/glsa/201903-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3701","reference_id":"RHSA-2019:3701","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3701"},{"reference_url":"https://usn.ubuntu.com/3882-1/","reference_id":"USN-3882-1","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:41Z/"}],"url":"https://usn.ubuntu.com/3882-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585517?format=json","purl":"pkg:deb/debian/curl@7.64.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.64.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2019-3822"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-79sv-kzb5-hbc4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80714?format=json","vulnerability_id":"VCID-7c8e-eaqy-akeu","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3153.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3153.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3153","reference_id":"","reference_type":"","scores":[{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92973","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92922","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.9293","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92934","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92933","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92941","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.9295","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92949","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.9296","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92962","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92969","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92972","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3153"},{"reference_url":"https://curl.se/docs/CVE-2015-3153.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2015-3153.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1217341","reference_id":"1217341","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1217341"},{"reference_url":"https://usn.ubuntu.com/2591-1/","reference_id":"USN-2591-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2591-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586312?format=json","purl":"pkg:deb/debian/curl@7.42.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.42.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2015-3153"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7c8e-eaqy-akeu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/16993?format=json","vulnerability_id":"VCID-7srk-hshe-h3f4","summary":"Improper Authentication\nAn authentication bypass vulnerability exists in libcurl v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified, which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However, two SSH settings were omitted from the configuration check, allowing them to match easily, potentially leading to the reuse of an inappropriate connection.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27538.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27538.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27538","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01646","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01621","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01629","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01627","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03622","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03588","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03599","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.036","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03574","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03579","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05595","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05559","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05545","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05601","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27538"},{"reference_url":"https://curl.se/docs/CVE-2023-27538.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-27538.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27538","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27538"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1898475","reference_id":"","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:52:04Z/"}],"url":"https://hackerone.com/reports/1898475"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179103","reference_id":"2179103","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179103"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27538","reference_id":"CVE-2023-27538","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27538"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:52:04Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html","reference_id":"msg00025.html","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:52:04Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230420-0010/","reference_id":"ntap-20230420-0010","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:52:04Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230420-0010/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6679","reference_id":"RHSA-2023:6679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6679"},{"reference_url":"https://usn.ubuntu.com/5964-1/","reference_id":"USN-5964-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5964-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584288?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584289?format=json","purl":"pkg:deb/debian/curl@7.88.1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2023-27538"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"6.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7srk-hshe-h3f4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49308?format=json","vulnerability_id":"VCID-7vt9-pf5q-uqb6","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/errata/RHBA-2019:0327","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"}],"url":"https://access.redhat.com/errata/RHBA-2019:0327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3157","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:3157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3558","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:3558"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0544","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0594","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2020:0594"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000301.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000301.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000301","reference_id":"","reference_type":"","scores":[{"value":"0.02038","scoring_system":"epss","scoring_elements":"0.83858","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02038","scoring_system":"epss","scoring_elements":"0.83856","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02712","scoring_system":"epss","scoring_elements":"0.85931","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02761","scoring_system":"epss","scoring_elements":"0.85957","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02761","scoring_system":"epss","scoring_elements":"0.85968","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02761","scoring_system":"epss","scoring_elements":"0.85984","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02761","scoring_system":"epss","scoring_elements":"0.86003","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02761","scoring_system":"epss","scoring_elements":"0.86013","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02761","scoring_system":"epss","scoring_elements":"0.86027","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02761","scoring_system":"epss","scoring_elements":"0.86025","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02761","scoring_system":"epss","scoring_elements":"0.8602","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02785","scoring_system":"epss","scoring_elements":"0.86119","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02785","scoring_system":"epss","scoring_elements":"0.86109","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000301"},{"reference_url":"https://curl.haxx.se/docs/adv_2018-b138.html","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"}],"url":"https://curl.haxx.se/docs/adv_2018-b138.html"},{"reference_url":"https://curl.se/docs/CVE-2018-1000301.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2018-1000301.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000301","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000301"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00010.html","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00010.html"},{"reference_url":"https://usn.ubuntu.com/3598-2/","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"}],"url":"https://usn.ubuntu.com/3598-2/"},{"reference_url":"https://www.debian.org/security/2018/dsa-4202","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"}],"url":"https://www.debian.org/security/2018/dsa-4202"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"}],"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"}],"url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"reference_url":"http://www.securityfocus.com/bid/104225","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"}],"url":"http://www.securityfocus.com/bid/104225"},{"reference_url":"http://www.securitytracker.com/id/1040931","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"}],"url":"http://www.securitytracker.com/id/1040931"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1575536","reference_id":"1575536","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1575536"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898856","reference_id":"898856","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898856"},{"reference_url":"https://security.archlinux.org/ASA-201805-13","reference_id":"ASA-201805-13","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201805-13"},{"reference_url":"https://security.archlinux.org/ASA-201805-14","reference_id":"ASA-201805-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201805-14"},{"reference_url":"https://security.archlinux.org/ASA-201805-15","reference_id":"ASA-201805-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201805-15"},{"reference_url":"https://security.archlinux.org/ASA-201805-16","reference_id":"ASA-201805-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201805-16"},{"reference_url":"https://security.archlinux.org/ASA-201805-17","reference_id":"ASA-201805-17","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201805-17"},{"reference_url":"https://security.archlinux.org/ASA-201805-18","reference_id":"ASA-201805-18","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201805-18"},{"reference_url":"https://security.archlinux.org/AVG-694","reference_id":"AVG-694","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-694"},{"reference_url":"https://security.archlinux.org/AVG-695","reference_id":"AVG-695","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-695"},{"reference_url":"https://security.archlinux.org/AVG-696","reference_id":"AVG-696","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-696"},{"reference_url":"https://security.archlinux.org/AVG-697","reference_id":"AVG-697","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-697"},{"reference_url":"https://security.archlinux.org/AVG-698","reference_id":"AVG-698","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-698"},{"reference_url":"https://security.archlinux.org/AVG-699","reference_id":"AVG-699","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-699"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000301","reference_id":"CVE-2018-1000301","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:P"},{"value":"9.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000301"},{"reference_url":"https://security.gentoo.org/glsa/201806-05","reference_id":"GLSA-201806-05","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"}],"url":"https://security.gentoo.org/glsa/201806-05"},{"reference_url":"https://usn.ubuntu.com/3648-1/","reference_id":"USN-3648-1","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:58:33Z/"}],"url":"https://usn.ubuntu.com/3648-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582786?format=json","purl":"pkg:deb/debian/curl@7.60.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.60.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2018-1000301"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7vt9-pf5q-uqb6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34691?format=json","vulnerability_id":"VCID-7xxh-66ys-4bhw","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5419.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5419.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5419","reference_id":"","reference_type":"","scores":[{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83461","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83598","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83586","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83593","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83474","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83488","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83487","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83511","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83521","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83535","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83529","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83526","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.8356","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83561","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83562","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5419"},{"reference_url":"https://curl.se/docs/CVE-2016-5419.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-5419.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1362183","reference_id":"1362183","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1362183"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2575","reference_id":"RHSA-2016:2575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2957","reference_id":"RHSA-2016:2957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2957"},{"reference_url":"https://usn.ubuntu.com/3048-1/","reference_id":"USN-3048-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3048-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584626?format=json","purl":"pkg:deb/debian/curl@7.50.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.50.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-5419"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7xxh-66ys-4bhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/55642?format=json","vulnerability_id":"VCID-87qu-j64w-p7fj","summary":"unchecked ssl certificate host name","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4545.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4545.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4545","reference_id":"","reference_type":"","scores":[{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.5769","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57618","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57702","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57724","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57699","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57754","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57756","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57772","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57751","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57731","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57761","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57757","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57734","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57693","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57712","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4545"},{"reference_url":"https://curl.se/docs/CVE-2013-4545.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2013-4545.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4545"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1029159","reference_id":"1029159","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1029159"},{"reference_url":"https://usn.ubuntu.com/2048-1/","reference_id":"USN-2048-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2048-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586294?format=json","purl":"pkg:deb/debian/curl@7.33.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.33.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-4545"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-87qu-j64w-p7fj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74681?format=json","vulnerability_id":"VCID-8m6a-ej6a-g3df","summary":"curl: freeing stack buffer in utf8asn1str","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6197.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6197.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-6197","reference_id":"","reference_type":"","scores":[{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79821","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79695","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79716","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79701","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.7973","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79737","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79759","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79743","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79765","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79766","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79769","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79799","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01302","scoring_system":"epss","scoring_elements":"0.79806","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-6197"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/24/1","reference_id":"1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-24T18:42:30Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/24/1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076996","reference_id":"1076996","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076996"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2299653","reference_id":"2299653","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2299653"},{"reference_url":"https://hackerone.com/reports/2559516","reference_id":"2559516","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-24T18:42:30Z/"}],"url":"https://hackerone.com/reports/2559516"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/24/5","reference_id":"5","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-24T18:42:30Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/24/5"},{"reference_url":"https://curl.se/docs/CVE-2024-6197.html","reference_id":"CVE-2024-6197.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-24T18:42:30Z/"}],"url":"https://curl.se/docs/CVE-2024-6197.html"},{"reference_url":"https://curl.se/docs/CVE-2024-6197.json","reference_id":"CVE-2024-6197.json","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-24T18:42:30Z/"}],"url":"https://curl.se/docs/CVE-2024-6197.json"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583078?format=json","purl":"pkg:deb/debian/curl@8.9.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.9.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2024-6197"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8m6a-ej6a-g3df"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64299?format=json","vulnerability_id":"VCID-8zks-th64-33b8","summary":"curl: curl: Unauthorized access due to improper HTTP proxy connection reuse","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3784.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3784.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3784","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03053","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03037","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03051","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03056","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03081","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03044","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03709","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03671","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03659","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03792","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03683","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06096","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06126","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06133","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3784"},{"reference_url":"https://curl.se/docs/CVE-2026-3784.html","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:48:38Z/"}],"url":"https://curl.se/docs/CVE-2026-3784.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3784","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3784"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/3584903","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:48:38Z/"}],"url":"https://hackerone.com/reports/3584903"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2446449","reference_id":"2446449","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2446449"},{"reference_url":"https://curl.se/docs/CVE-2026-3784.json","reference_id":"CVE-2026-3784.json","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:48:38Z/"}],"url":"https://curl.se/docs/CVE-2026-3784.json"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6893","reference_id":"RHSA-2026:6893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6893"},{"reference_url":"https://usn.ubuntu.com/8084-1/","reference_id":"USN-8084-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8084-1/"},{"reference_url":"https://usn.ubuntu.com/8099-1/","reference_id":"USN-8099-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8099-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2026-3784"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8zks-th64-33b8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34391?format=json","vulnerability_id":"VCID-9cbd-x468-rkaw","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16840.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16840.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16840","reference_id":"","reference_type":"","scores":[{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.451","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.5375","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53718","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53745","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53717","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.5377","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53767","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53815","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53798","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53783","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.5382","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53824","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53805","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53771","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00305","scoring_system":"epss","scoring_elements":"0.53784","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16840"},{"reference_url":"https://curl.se/docs/CVE-2018-16840.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2018-16840.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16840"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1042013","reference_id":"1042013","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:08:48Z/"}],"url":"http://www.securitytracker.com/id/1042013"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1642203","reference_id":"1642203","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1642203"},{"reference_url":"https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f","reference_id":"81d135d67155c5295b1033679c606165d4e28f3f","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:08:48Z/"}],"url":"https://github.com/curl/curl/commit/81d135d67155c5295b1033679c606165d4e28f3f"},{"reference_url":"https://security.archlinux.org/ASA-201811-4","reference_id":"ASA-201811-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201811-4"},{"reference_url":"https://security.archlinux.org/ASA-201811-5","reference_id":"ASA-201811-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201811-5"},{"reference_url":"https://security.archlinux.org/ASA-201811-6","reference_id":"ASA-201811-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201811-6"},{"reference_url":"https://security.archlinux.org/ASA-201811-7","reference_id":"ASA-201811-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201811-7"},{"reference_url":"https://security.archlinux.org/ASA-201811-8","reference_id":"ASA-201811-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201811-8"},{"reference_url":"https://security.archlinux.org/ASA-201811-9","reference_id":"ASA-201811-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201811-9"},{"reference_url":"https://security.archlinux.org/AVG-795","reference_id":"AVG-795","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-795"},{"reference_url":"https://security.archlinux.org/AVG-796","reference_id":"AVG-796","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-796"},{"reference_url":"https://security.archlinux.org/AVG-797","reference_id":"AVG-797","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-797"},{"reference_url":"https://security.archlinux.org/AVG-798","reference_id":"AVG-798","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-798"},{"reference_url":"https://security.archlinux.org/AVG-799","reference_id":"AVG-799","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-799"},{"reference_url":"https://security.archlinux.org/AVG-800","reference_id":"AVG-800","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-800"},{"reference_url":"https://curl.haxx.se/docs/CVE-2018-16840.html","reference_id":"CVE-2018-16840.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:08:48Z/"}],"url":"https://curl.haxx.se/docs/CVE-2018-16840.html"},{"reference_url":"https://security.gentoo.org/glsa/201903-03","reference_id":"GLSA-201903-03","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:08:48Z/"}],"url":"https://security.gentoo.org/glsa/201903-03"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840","reference_id":"show_bug.cgi?id=CVE-2018-16840","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:08:48Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16840"},{"reference_url":"https://usn.ubuntu.com/3805-1/","reference_id":"USN-3805-1","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:08:48Z/"}],"url":"https://usn.ubuntu.com/3805-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583784?format=json","purl":"pkg:deb/debian/curl@7.62.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.62.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2018-16840"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9cbd-x468-rkaw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57259?format=json","vulnerability_id":"VCID-9ggp-5wfj-ufcq","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43552.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43552.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-43552","reference_id":"","reference_type":"","scores":[{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.27943","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28229","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28135","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28022","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42477","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42428","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42458","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42397","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42447","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42455","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42433","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42409","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.4244","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-43552"},{"reference_url":"https://curl.se/docs/CVE-2022-43552.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-43552.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1764858","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/"}],"url":"https://hackerone.com/reports/1764858"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026830","reference_id":"1026830","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026830"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Mar/17","reference_id":"17","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Mar/17"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2152652","reference_id":"2152652","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2152652"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://support.apple.com/kb/HT213670","reference_id":"HT213670","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/"}],"url":"https://support.apple.com/kb/HT213670"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230214-0002/","reference_id":"ntap-20230214-0002","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T14:27:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230214-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2478","reference_id":"RHSA-2023:2478","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2478"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2963","reference_id":"RHSA-2023:2963","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2963"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3354","reference_id":"RHSA-2023:3354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3354"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3355","reference_id":"RHSA-2023:3355","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7743","reference_id":"RHSA-2023:7743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0428","reference_id":"RHSA-2024:0428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0428"},{"reference_url":"https://usn.ubuntu.com/5788-1/","reference_id":"USN-5788-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5788-1/"},{"reference_url":"https://usn.ubuntu.com/5894-1/","reference_id":"USN-5894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5894-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583299?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584156?format=json","purl":"pkg:deb/debian/curl@7.86.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.86.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2022-43552"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9ggp-5wfj-ufcq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69488?format=json","vulnerability_id":"VCID-9mjz-apkm-g7h1","summary":"libcurl: curl: QUIC certificate check skip with wolfSSL","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4947.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4947.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-4947","reference_id":"","reference_type":"","scores":[{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22409","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22692","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.2271","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22671","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22613","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22628","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22624","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22576","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22421","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22411","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22731","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22775","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22565","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22641","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-4947"},{"reference_url":"https://curl.se/docs/CVE-2025-4947.html","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T13:57:59Z/"}],"url":"https://curl.se/docs/CVE-2025-4947.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/3150884","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T13:57:59Z/"}],"url":"https://hackerone.com/reports/3150884"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2368887","reference_id":"2368887","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2368887"},{"reference_url":"https://security.archlinux.org/AVG-2887","reference_id":"AVG-2887","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2887"},{"reference_url":"https://curl.se/docs/CVE-2025-4947.json","reference_id":"CVE-2025-4947.json","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T13:57:59Z/"}],"url":"https://curl.se/docs/CVE-2025-4947.json"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/585168?format=json","purl":"pkg:deb/debian/curl@8.14.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2025-4947"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9mjz-apkm-g7h1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49278?format=json","vulnerability_id":"VCID-9nak-pscy-e7gs","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32221.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32221.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32221","reference_id":"","reference_type":"","scores":[{"value":"0.01612","scoring_system":"epss","scoring_elements":"0.81849","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01612","scoring_system":"epss","scoring_elements":"0.81845","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82219","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82179","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82218","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82185","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01711","scoring_system":"epss","scoring_elements":"0.82397","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02591","scoring_system":"epss","scoring_elements":"0.85547","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02591","scoring_system":"epss","scoring_elements":"0.8553","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02753","scoring_system":"epss","scoring_elements":"0.85969","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02753","scoring_system":"epss","scoring_elements":"0.86012","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02753","scoring_system":"epss","scoring_elements":"0.85998","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02753","scoring_system":"epss","scoring_elements":"0.85988","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32221"},{"reference_url":"https://curl.se/docs/CVE-2022-32221.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-32221.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1704017","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"https://hackerone.com/reports/1704017"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jan/19","reference_id":"19","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jan/19"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jan/20","reference_id":"20","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jan/20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2135411","reference_id":"2135411","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2135411"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/05/17/4","reference_id":"4","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/05/17/4"},{"reference_url":"https://www.debian.org/security/2023/dsa-5330","reference_id":"dsa-5330","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"https://www.debian.org/security/2023/dsa-5330"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://support.apple.com/kb/HT213604","reference_id":"HT213604","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"https://support.apple.com/kb/HT213604"},{"reference_url":"https://support.apple.com/kb/HT213605","reference_id":"HT213605","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"https://support.apple.com/kb/HT213605"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html","reference_id":"msg00028.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230110-0006/","reference_id":"ntap-20230110-0006","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230110-0006/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230208-0002/","reference_id":"ntap-20230208-0002","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230208-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8840","reference_id":"RHSA-2022:8840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8841","reference_id":"RHSA-2022:8841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0333","reference_id":"RHSA-2023:0333","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0333"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4139","reference_id":"RHSA-2023:4139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4139"},{"reference_url":"https://usn.ubuntu.com/5702-1/","reference_id":"USN-5702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5702-1/"},{"reference_url":"https://usn.ubuntu.com/5702-2/","reference_id":"USN-5702-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5702-2/"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583299?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583300?format=json","purl":"pkg:deb/debian/curl@7.86.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.86.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2022-32221"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9nak-pscy-e7gs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49918?format=json","vulnerability_id":"VCID-9q2w-yxvk-pbhd","summary":"cURL is vulnerable to local arbitrary code execution via buffer overflow\n    due to the insecure parsing of URLs.","references":[{"reference_url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.16/SCOSA-2006.16.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.16/SCOSA-2006.16.txt"},{"reference_url":"http://curl.haxx.se/docs/adv_20051207.html","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/docs/adv_20051207.html"},{"reference_url":"http://docs.info.apple.com/article.html?artnum=307562","reference_id":"","reference_type":"","scores":[],"url":"http://docs.info.apple.com/article.html?artnum=307562"},{"reference_url":"http://lists.apple.com/archives/security-announce/2006/May/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2006/May/msg00003.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"},{"reference_url":"http://qa.openoffice.org/issues/show_bug.cgi?id=59032","reference_id":"","reference_type":"","scores":[],"url":"http://qa.openoffice.org/issues/show_bug.cgi?id=59032"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4077.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4077.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-4077","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50061","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50051","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50102","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50108","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50085","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50113","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50063","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50117","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5011","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50128","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50101","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50143","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50115","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-4077"},{"reference_url":"https://curl.se/docs/CVE-2005-4077.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2005-4077.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4077","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4077"},{"reference_url":"http://secunia.com/advisories/17907","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17907"},{"reference_url":"http://secunia.com/advisories/17960","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17960"},{"reference_url":"http://secunia.com/advisories/17961","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17961"},{"reference_url":"http://secunia.com/advisories/17965","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17965"},{"reference_url":"http://secunia.com/advisories/17977","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17977"},{"reference_url":"http://secunia.com/advisories/18105","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18105"},{"reference_url":"http://secunia.com/advisories/18188","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18188"},{"reference_url":"http://secunia.com/advisories/18336","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18336"},{"reference_url":"http://secunia.com/advisories/19261","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19261"},{"reference_url":"http://secunia.com/advisories/19433","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19433"},{"reference_url":"http://secunia.com/advisories/19457","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19457"},{"reference_url":"http://secunia.com/advisories/20077","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/20077"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10855","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10855"},{"reference_url":"http://www.debian.org/security/2005/dsa-919","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-919"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200512-09.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200512-09.xml"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200603-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200603-25.xml"},{"reference_url":"http://www.hardened-php.net/advisory_242005.109.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.hardened-php.net/advisory_242005.109.html"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:224","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:224"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-875.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-875.html"},{"reference_url":"http://www.securityfocus.com/archive/1/418849/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/418849/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/15756","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/15756"},{"reference_url":"http://www.securityfocus.com/bid/17951","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/17951"},{"reference_url":"http://www.trustix.org/errata/2005/0072/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2005/0072/"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA06-132A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA06-132A.html"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2791","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2791"},{"reference_url":"http://www.vupen.com/english/advisories/2006/0960","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/0960"},{"reference_url":"http://www.vupen.com/english/advisories/2006/1779","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/1779"},{"reference_url":"http://www.vupen.com/english/advisories/2008/0924/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/0924/references"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617850","reference_id":"1617850","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617850"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342339","reference_id":"342339","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342339"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:daniel_stenberg:curl:7.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:daniel_stenberg:curl:7.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:daniel_stenberg:curl:7.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:daniel_stenberg:curl:7.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:daniel_stenberg:curl:7.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:daniel_stenberg:curl:7.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:daniel_stenberg:curl:7.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:daniel_stenberg:curl:7.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:daniel_stenberg:curl:7.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:daniel_stenberg:curl:7.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:daniel_stenberg:curl:7.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-4077","reference_id":"CVE-2005-4077","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-4077"},{"reference_url":"https://security.gentoo.org/glsa/200512-09","reference_id":"GLSA-200512-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200512-09"},{"reference_url":"https://security.gentoo.org/glsa/200603-25","reference_id":"GLSA-200603-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200603-25"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:875","reference_id":"RHSA-2005:875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:875"},{"reference_url":"https://usn.ubuntu.com/228-1/","reference_id":"USN-228-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/228-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583930?format=json","purl":"pkg:deb/debian/curl@7.15.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.15.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2005-4077"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9q2w-yxvk-pbhd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34694?format=json","vulnerability_id":"VCID-a3v7-ptf1-6qgd","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7141.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7141.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7141","reference_id":"","reference_type":"","scores":[{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66857","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66895","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66921","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66943","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66957","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66977","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66963","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66932","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66964","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66979","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.6696","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66982","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66995","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00524","scoring_system":"epss","scoring_elements":"0.66993","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7141"},{"reference_url":"https://curl.se/docs/CVE-2016-7141.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-7141.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7141","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7141"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1373229","reference_id":"1373229","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1373229"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836918","reference_id":"836918","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836918"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2575","reference_id":"RHSA-2016:2575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2957","reference_id":"RHSA-2016:2957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2957"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583608?format=json","purl":"pkg:deb/debian/curl@7.51.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-7141"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a3v7-ptf1-6qgd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/164220?format=json","vulnerability_id":"VCID-a9b6-m25r-kygw","summary":"The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, makes it easier for remote attackers to conduct man-in-the-middle attacks via a crafted wildcard SAN in a server certificate, as demonstrated by \"*.com.\"","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9952","reference_id":"","reference_type":"","scores":[{"value":"0.01005","scoring_system":"epss","scoring_elements":"0.77128","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01005","scoring_system":"epss","scoring_elements":"0.7708","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01005","scoring_system":"epss","scoring_elements":"0.77072","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01005","scoring_system":"epss","scoring_elements":"0.77107","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01005","scoring_system":"epss","scoring_elements":"0.77114","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01005","scoring_system":"epss","scoring_elements":"0.76977","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01005","scoring_system":"epss","scoring_elements":"0.76983","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01005","scoring_system":"epss","scoring_elements":"0.77012","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01005","scoring_system":"epss","scoring_elements":"0.76993","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01005","scoring_system":"epss","scoring_elements":"0.77025","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01005","scoring_system":"epss","scoring_elements":"0.77035","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01005","scoring_system":"epss","scoring_elements":"0.77063","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01005","scoring_system":"epss","scoring_elements":"0.77042","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01005","scoring_system":"epss","scoring_elements":"0.77037","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01005","scoring_system":"epss","scoring_elements":"0.77078","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9952"},{"reference_url":"https://curl.se/docs/CVE-2016-9952.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-9952.html"},{"reference_url":"https://curl.haxx.se/docs/adv_20161221B.html","reference_id":"adv_20161221B.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-23T19:19:07Z/"}],"url":"https://curl.haxx.se/docs/adv_20161221B.html"},{"reference_url":"https://curl.haxx.se/CVE-2016-9952.patch","reference_id":"CVE-2016-9952.patch","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-23T19:19:07Z/"}],"url":"https://curl.haxx.se/CVE-2016-9952.patch"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-9952"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a9b6-m25r-kygw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47222?format=json","vulnerability_id":"VCID-ac6r-spds-qbf5","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which may lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5435.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5435.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5435","reference_id":"","reference_type":"","scores":[{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38366","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.3809","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38402","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38429","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38208","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38185","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38503","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38528","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.3839","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38441","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38449","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38464","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38427","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5435"},{"reference_url":"https://curl.se/docs/CVE-2019-5435.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2019-5435.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5435"},{"reference_url":"https://hackerone.com/reports/547630","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/547630"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1710609","reference_id":"1710609","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1710609"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929352","reference_id":"929352","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929352"},{"reference_url":"https://security.archlinux.org/ASA-201905-13","reference_id":"ASA-201905-13","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201905-13"},{"reference_url":"https://security.archlinux.org/ASA-201905-14","reference_id":"ASA-201905-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201905-14"},{"reference_url":"https://security.archlinux.org/ASA-201905-15","reference_id":"ASA-201905-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201905-15"},{"reference_url":"https://security.archlinux.org/AVG-961","reference_id":"AVG-961","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-961"},{"reference_url":"https://security.archlinux.org/AVG-962","reference_id":"AVG-962","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-962"},{"reference_url":"https://security.archlinux.org/AVG-963","reference_id":"AVG-963","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-963"},{"reference_url":"https://security.gentoo.org/glsa/202003-29","reference_id":"GLSA-202003-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4383","reference_id":"RHSA-2020:4383","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4383"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4384","reference_id":"RHSA-2020:4384","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4384"},{"reference_url":"https://usn.ubuntu.com/3993-1/","reference_id":"USN-3993-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3993-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584375?format=json","purl":"pkg:deb/debian/curl@7.64.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.64.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2019-5435"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ac6r-spds-qbf5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/355402?format=json","vulnerability_id":"VCID-acd8-mwm2-zka5","summary":"","references":[{"reference_url":"https://curl.se/docs/CVE-2026-7009.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2026-7009.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/3694390","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/3694390"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2026-7009"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-acd8-mwm2-zka5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59713?format=json","vulnerability_id":"VCID-ae59-w7a1-7keg","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2486","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3558","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3558"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000254.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000254.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000254","reference_id":"","reference_type":"","scores":[{"value":"0.01178","scoring_system":"epss","scoring_elements":"0.78736","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01178","scoring_system":"epss","scoring_elements":"0.78727","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01318","scoring_system":"epss","scoring_elements":"0.79946","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01318","scoring_system":"epss","scoring_elements":"0.79891","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01318","scoring_system":"epss","scoring_elements":"0.79892","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01318","scoring_system":"epss","scoring_elements":"0.79894","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01318","scoring_system":"epss","scoring_elements":"0.79923","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01318","scoring_system":"epss","scoring_elements":"0.79929","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80036","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80064","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80053","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80081","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80089","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80109","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80043","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000254"},{"reference_url":"https://curl.haxx.se/673d0cd8.patch","reference_id":"","reference_type":"","scores":[],"url":"https://curl.haxx.se/673d0cd8.patch"},{"reference_url":"https://curl.haxx.se/docs/adv_20171004.html","reference_id":"","reference_type":"","scores":[],"url":"https://curl.haxx.se/docs/adv_20171004.html"},{"reference_url":"https://curl.se/docs/CVE-2017-1000254.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2017-1000254.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"https://support.apple.com/HT208331","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT208331"},{"reference_url":"http://www.debian.org/security/2017/dsa-3992","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3992"},{"reference_url":"http://www.securityfocus.com/bid/101115","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101115"},{"reference_url":"http://www.securitytracker.com/id/1039509","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039509"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1495541","reference_id":"1495541","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1495541"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877671","reference_id":"877671","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877671"},{"reference_url":"https://security.archlinux.org/ASA-201710-2","reference_id":"ASA-201710-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-2"},{"reference_url":"https://security.archlinux.org/ASA-201710-3","reference_id":"ASA-201710-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-3"},{"reference_url":"https://security.archlinux.org/ASA-201710-4","reference_id":"ASA-201710-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-4"},{"reference_url":"https://security.archlinux.org/ASA-201710-5","reference_id":"ASA-201710-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-5"},{"reference_url":"https://security.archlinux.org/ASA-201710-6","reference_id":"ASA-201710-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-6"},{"reference_url":"https://security.archlinux.org/ASA-201710-7","reference_id":"ASA-201710-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-7"},{"reference_url":"https://security.archlinux.org/AVG-371","reference_id":"AVG-371","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-371"},{"reference_url":"https://security.archlinux.org/AVG-386","reference_id":"AVG-386","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-386"},{"reference_url":"https://security.archlinux.org/AVG-387","reference_id":"AVG-387","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-387"},{"reference_url":"https://security.archlinux.org/AVG-388","reference_id":"AVG-388","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-388"},{"reference_url":"https://security.archlinux.org/AVG-389","reference_id":"AVG-389","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-389"},{"reference_url":"https://security.archlinux.org/AVG-422","reference_id":"AVG-422","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-422"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.55.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.55.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000254","reference_id":"CVE-2017-1000254","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000254"},{"reference_url":"https://security.gentoo.org/glsa/201712-04","reference_id":"GLSA-201712-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201712-04"},{"reference_url":"https://usn.ubuntu.com/3441-1/","reference_id":"USN-3441-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3441-1/"},{"reference_url":"https://usn.ubuntu.com/3441-2/","reference_id":"USN-3441-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3441-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582668?format=json","purl":"pkg:deb/debian/curl@7.56.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.56.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2017-1000254"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ae59-w7a1-7keg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64298?format=json","vulnerability_id":"VCID-amgy-dw6h-6ydf","summary":"curl: curl: Arbitrary code execution or Denial of Service via use-after-free in SMB request handling","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3805.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3805.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3805","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05799","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08051","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08115","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08078","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11667","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11817","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11805","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11837","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11752","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1188","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12821","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12966","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12921","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12823","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3805"},{"reference_url":"https://curl.se/docs/CVE-2026-3805.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:45:10Z/"}],"url":"https://curl.se/docs/CVE-2026-3805.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/3591944","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:45:10Z/"}],"url":"https://hackerone.com/reports/3591944"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2446451","reference_id":"2446451","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2446451"},{"reference_url":"https://curl.se/docs/CVE-2026-3805.json","reference_id":"CVE-2026-3805.json","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:45:10Z/"}],"url":"https://curl.se/docs/CVE-2026-3805.json"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6893","reference_id":"RHSA-2026:6893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6893"},{"reference_url":"https://usn.ubuntu.com/8084-1/","reference_id":"USN-8084-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8084-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2026-3805"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-amgy-dw6h-6ydf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57263?format=json","vulnerability_id":"VCID-arjz-67yz-wkg9","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27533.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27533.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27533","reference_id":"","reference_type":"","scores":[{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38441","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38719","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38554","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38529","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.4044","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40439","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40465","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40389","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40463","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40415","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40434","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40472","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.4427","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27533"},{"reference_url":"https://curl.se/docs/CVE-2023-27533.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-27533.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27533"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1891474","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/"}],"url":"https://hackerone.com/reports/1891474"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179062","reference_id":"2179062","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179062"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/","reference_id":"36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html","reference_id":"msg00025.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230420-0011/","reference_id":"ntap-20230420-0011","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230420-0011/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3354","reference_id":"RHSA-2023:3354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3354"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3355","reference_id":"RHSA-2023:3355","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6679","reference_id":"RHSA-2023:6679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6679"},{"reference_url":"https://usn.ubuntu.com/5964-1/","reference_id":"USN-5964-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5964-1/"},{"reference_url":"https://usn.ubuntu.com/5964-2/","reference_id":"USN-5964-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5964-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584288?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584289?format=json","purl":"pkg:deb/debian/curl@7.88.1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2023-27533"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-arjz-67yz-wkg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68003?format=json","vulnerability_id":"VCID-aua9-4frt-xugf","summary":"curl: libcurl: Curl out of bounds read for cookie path","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9086.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9086.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-9086","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10138","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10177","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10241","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13356","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13463","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13491","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13485","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13412","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14356","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14303","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14302","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14264","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14208","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14098","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-9086"},{"reference_url":"https://curl.se/docs/CVE-2025-9086.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-12T17:15:47Z/"}],"url":"https://curl.se/docs/CVE-2025-9086.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/3294999","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-12T17:15:47Z/"}],"url":"https://hackerone.com/reports/3294999"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2394750","reference_id":"2394750","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2394750"},{"reference_url":"https://curl.se/docs/CVE-2025-9086.json","reference_id":"CVE-2025-9086.json","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-12T17:15:47Z/"}],"url":"https://curl.se/docs/CVE-2025-9086.json"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23043","reference_id":"RHSA-2025:23043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23125","reference_id":"RHSA-2025:23125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23126","reference_id":"RHSA-2025:23126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23127","reference_id":"RHSA-2025:23127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23383","reference_id":"RHSA-2025:23383","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23383"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1350","reference_id":"RHSA-2026:1350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1350"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1477","reference_id":"RHSA-2026:1477","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1477"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1736","reference_id":"RHSA-2026:1736","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1736"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1825","reference_id":"RHSA-2026:1825","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1825"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2485","reference_id":"RHSA-2026:2485","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2563","reference_id":"RHSA-2026:2563","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4943","reference_id":"RHSA-2026:4943","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4943"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6893","reference_id":"RHSA-2026:6893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6893"},{"reference_url":"https://usn.ubuntu.com/8062-1/","reference_id":"USN-8062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8062-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/586210?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/586211?format=json","purl":"pkg:deb/debian/curl@8.16.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.16.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2025-9086"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aua9-4frt-xugf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34689?format=json","vulnerability_id":"VCID-b2ef-zj3u-rbhy","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"http://curl.haxx.se/docs/adv_20160127A.html","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/docs/adv_20160127A.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html"},{"reference_url":"http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0755.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0755.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0755","reference_id":"","reference_type":"","scores":[{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61478","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61466","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61483","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61326","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61402","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61431","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61401","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61447","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61463","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61484","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61471","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61452","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61492","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61496","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61479","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0755"},{"reference_url":"https://curl.se/docs/CVE-2016-0755.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-0755.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755"},{"reference_url":"https://support.apple.com/HT207170","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT207170"},{"reference_url":"http://www.debian.org/security/2016/dsa-3455","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3455"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"reference_url":"http://www.securityfocus.com/bid/82307","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82307"},{"reference_url":"http://www.securitytracker.com/id/1034882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034882"},{"reference_url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965","reference_id":"","reference_type":"","scores":[],"url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965"},{"reference_url":"http://www.ubuntu.com/usn/USN-2882-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2882-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1302263","reference_id":"1302263","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1302263"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0755","reference_id":"CVE-2016-0755","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0755"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://usn.ubuntu.com/2882-1/","reference_id":"USN-2882-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2882-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584745?format=json","purl":"pkg:deb/debian/curl@7.47.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.47.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-0755"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b2ef-zj3u-rbhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47210?format=json","vulnerability_id":"VCID-b69q-9yrr-myf7","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0853.json","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0853.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0853","reference_id":"","reference_type":"","scores":[{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36038","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36069","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36299","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36353","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.3637","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36328","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.3635","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36385","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36378","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36358","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.3631","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36442","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36475","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40248","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0853"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262097","reference_id":"2262097","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2262097"},{"reference_url":"https://hackerone.com/reports/2298922","reference_id":"2298922","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:54:33Z/"}],"url":"https://hackerone.com/reports/2298922"},{"reference_url":"https://curl.se/docs/CVE-2024-0853.html","reference_id":"CVE-2024-0853.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:54:33Z/"}],"url":"https://curl.se/docs/CVE-2024-0853.html"},{"reference_url":"https://curl.se/docs/CVE-2024-0853.json","reference_id":"CVE-2024-0853.json","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:54:33Z/"}],"url":"https://curl.se/docs/CVE-2024-0853.json"},{"reference_url":"https://security.gentoo.org/glsa/202409-20","reference_id":"GLSA-202409-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-20"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240307-0004/","reference_id":"ntap-20240307-0004","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:54:33Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240307-0004/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0009/","reference_id":"ntap-20240426-0009","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:54:33Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0009/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240503-0012/","reference_id":"ntap-20240503-0012","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-13T19:54:33Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240503-0012/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/585837?format=json","purl":"pkg:deb/debian/curl@8.6.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.6.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2024-0853"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b69q-9yrr-myf7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49271?format=json","vulnerability_id":"VCID-bb2f-7qrm-1kca","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27781.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27781.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27781","reference_id":"","reference_type":"","scores":[{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22782","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23104","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23149","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2294","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23013","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23066","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23085","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23049","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22992","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23006","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22998","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22961","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22794","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22789","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27781"},{"reference_url":"https://curl.se/docs/CVE-2022-27781.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-27781.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1555441","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:02:11Z/"}],"url":"https://hackerone.com/reports/1555441"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082204","reference_id":"2082204","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082204"},{"reference_url":"https://security.archlinux.org/AVG-2706","reference_id":"AVG-2706","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2706"},{"reference_url":"https://www.debian.org/security/2022/dsa-5197","reference_id":"dsa-5197","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:02:11Z/"}],"url":"https://www.debian.org/security/2022/dsa-5197"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:02:11Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:02:11Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220609-0009/","reference_id":"ntap-20220609-0009","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:02:11Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220609-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8840","reference_id":"RHSA-2022:8840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8841","reference_id":"RHSA-2022:8841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8841"},{"reference_url":"https://usn.ubuntu.com/5412-1/","reference_id":"USN-5412-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5412-1/"},{"reference_url":"https://usn.ubuntu.com/5499-1/","reference_id":"USN-5499-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5499-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582658?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582920?format=json","purl":"pkg:deb/debian/curl@7.83.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2022-27781"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bb2f-7qrm-1kca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41498?format=json","vulnerability_id":"VCID-bdrx-sm6b-sken","summary":"Multiple vulnerabilities have been found in cURL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6422.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6422.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6422","reference_id":"","reference_type":"","scores":[{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48617","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.486","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48641","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48663","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48615","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48669","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48666","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48684","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48658","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.4867","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48719","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48715","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48672","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48657","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48667","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-6422"},{"reference_url":"https://curl.se/docs/CVE-2013-6422.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2013-6422.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6422","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6422"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1037918","reference_id":"1037918","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1037918"},{"reference_url":"https://security.gentoo.org/glsa/201401-14","reference_id":"GLSA-201401-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-14"},{"reference_url":"https://usn.ubuntu.com/2058-1/","reference_id":"USN-2058-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2058-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584434?format=json","purl":"pkg:deb/debian/curl@7.34.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.34.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-6422"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bdrx-sm6b-sken"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/11278?format=json","vulnerability_id":"VCID-bdy2-8gub-tfe6","summary":"Double Free\nWhen sending data to an MQTT server, libcurl could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22945.json","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22945.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22945","reference_id":"","reference_type":"","scores":[{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57605","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57712","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57677","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57699","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.5769","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.5768","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57721","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57744","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57748","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57719","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57738","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57759","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57743","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57741","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57686","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22945"},{"reference_url":"https://curl.se/docs/CVE-2021-22945.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2021-22945.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1269242","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/"}],"url":"https://hackerone.com/reports/1269242"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2001527","reference_id":"2001527","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2001527"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Mar/29","reference_id":"29","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Mar/29"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/","reference_id":"APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/"},{"reference_url":"https://security.archlinux.org/AVG-2384","reference_id":"AVG-2384","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2384"},{"reference_url":"https://security.archlinux.org/AVG-2385","reference_id":"AVG-2385","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2385"},{"reference_url":"https://security.archlinux.org/AVG-2386","reference_id":"AVG-2386","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2386"},{"reference_url":"https://security.archlinux.org/AVG-2387","reference_id":"AVG-2387","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2387"},{"reference_url":"https://security.archlinux.org/AVG-2388","reference_id":"AVG-2388","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2388"},{"reference_url":"https://security.archlinux.org/AVG-2389","reference_id":"AVG-2389","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2389"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22945","reference_id":"CVE-2021-22945","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22945"},{"reference_url":"https://www.debian.org/security/2022/dsa-5197","reference_id":"dsa-5197","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/"}],"url":"https://www.debian.org/security/2022/dsa-5197"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://support.apple.com/kb/HT213183","reference_id":"HT213183","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/"}],"url":"https://support.apple.com/kb/HT213183"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211029-0003/","reference_id":"ntap-20211029-0003","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211029-0003/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/","reference_id":"RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-03-28T15:53:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/"},{"reference_url":"https://usn.ubuntu.com/5079-1/","reference_id":"USN-5079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5079-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582658?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584001?format=json","purl":"pkg:deb/debian/curl@7.79.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.79.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2021-22945"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bdy2-8gub-tfe6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/354617?format=json","vulnerability_id":"VCID-bgdk-ebn7-eycn","summary":"","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5545.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5545.json"},{"reference_url":"https://curl.se/docs/CVE-2026-5545.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2026-5545.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5545"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/3642555","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/3642555"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2461204","reference_id":"2461204","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2461204"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:12916","reference_id":"RHSA-2026:12916","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:12916"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2026-5545"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bgdk-ebn7-eycn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34693?format=json","vulnerability_id":"VCID-bgtv-jrna-9yb3","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5421.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5421.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5421","reference_id":"","reference_type":"","scores":[{"value":"0.01296","scoring_system":"epss","scoring_elements":"0.79647","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01296","scoring_system":"epss","scoring_elements":"0.79779","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01296","scoring_system":"epss","scoring_elements":"0.79757","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01296","scoring_system":"epss","scoring_elements":"0.79764","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01296","scoring_system":"epss","scoring_elements":"0.79653","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01296","scoring_system":"epss","scoring_elements":"0.79675","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01296","scoring_system":"epss","scoring_elements":"0.79661","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01296","scoring_system":"epss","scoring_elements":"0.7969","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01296","scoring_system":"epss","scoring_elements":"0.79697","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01296","scoring_system":"epss","scoring_elements":"0.79718","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01296","scoring_system":"epss","scoring_elements":"0.79702","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01296","scoring_system":"epss","scoring_elements":"0.79695","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01296","scoring_system":"epss","scoring_elements":"0.79723","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01296","scoring_system":"epss","scoring_elements":"0.79724","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01296","scoring_system":"epss","scoring_elements":"0.79727","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5421"},{"reference_url":"https://curl.se/docs/CVE-2016-5421.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-5421.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1362199","reference_id":"1362199","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1362199"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://usn.ubuntu.com/3048-1/","reference_id":"USN-3048-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3048-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584626?format=json","purl":"pkg:deb/debian/curl@7.50.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.50.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-5421"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bgtv-jrna-9yb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59715?format=json","vulnerability_id":"VCID-bhvd-ntxz-dkg4","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3558","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T21:01:08Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:3558"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8816.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8816.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8816","reference_id":"","reference_type":"","scores":[{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63812","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63733","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63794","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63821","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63778","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63829","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63846","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.6386","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63848","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63857","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64504","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64505","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64492","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8816"},{"reference_url":"https://curl.haxx.se/docs/adv_2017-12e7.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T21:01:08Z/"}],"url":"https://curl.haxx.se/docs/adv_2017-12e7.html"},{"reference_url":"https://curl.se/docs/CVE-2017-8816.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2017-8816.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817"},{"reference_url":"http://security.cucumberlinux.com/security/details.php?id=161","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T21:01:08Z/"}],"url":"http://security.cucumberlinux.com/security/details.php?id=161"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.debian.org/security/2017/dsa-4051","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T21:01:08Z/"}],"url":"https://www.debian.org/security/2017/dsa-4051"},{"reference_url":"http://www.securityfocus.com/bid/101998","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T21:01:08Z/"}],"url":"http://www.securityfocus.com/bid/101998"},{"reference_url":"http://www.securitytracker.com/id/1039896","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T21:01:08Z/"}],"url":"http://www.securitytracker.com/id/1039896"},{"reference_url":"http://www.securitytracker.com/id/1040608","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T21:01:08Z/"}],"url":"http://www.securitytracker.com/id/1040608"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1515757","reference_id":"1515757","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1515757"},{"reference_url":"https://security.archlinux.org/ASA-201711-36","reference_id":"ASA-201711-36","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-36"},{"reference_url":"https://security.archlinux.org/ASA-201711-37","reference_id":"ASA-201711-37","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-37"},{"reference_url":"https://security.archlinux.org/ASA-201711-38","reference_id":"ASA-201711-38","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-38"},{"reference_url":"https://security.archlinux.org/AVG-521","reference_id":"AVG-521","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-521"},{"reference_url":"https://security.archlinux.org/AVG-522","reference_id":"AVG-522","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-522"},{"reference_url":"https://security.archlinux.org/AVG-523","reference_id":"AVG-523","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-523"},{"reference_url":"https://security.archlinux.org/AVG-527","reference_id":"AVG-527","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-527"},{"reference_url":"https://security.archlinux.org/AVG-528","reference_id":"AVG-528","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-528"},{"reference_url":"https://security.archlinux.org/AVG-529","reference_id":"AVG-529","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-529"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8816","reference_id":"CVE-2017-8816","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8816"},{"reference_url":"https://security.gentoo.org/glsa/201712-04","reference_id":"GLSA-201712-04","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T21:01:08Z/"}],"url":"https://security.gentoo.org/glsa/201712-04"},{"reference_url":"https://usn.ubuntu.com/3498-1/","reference_id":"USN-3498-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3498-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585790?format=json","purl":"pkg:deb/debian/curl@7.57.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.57.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2017-8816"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bhvd-ntxz-dkg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49701?format=json","vulnerability_id":"VCID-bv57-gvfs-qfhj","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000121.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000121.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000121","reference_id":"","reference_type":"","scores":[{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86848","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86952","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.869","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86913","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86908","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86902","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86919","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86924","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86942","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86947","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86858","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86877","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86872","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03154","scoring_system":"epss","scoring_elements":"0.86891","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000121"},{"reference_url":"https://curl.se/docs/CVE-2018-1000121.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2018-1000121.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1552631","reference_id":"1552631","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1552631"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546","reference_id":"893546","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546"},{"reference_url":"https://security.archlinux.org/ASA-201803-15","reference_id":"ASA-201803-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-15"},{"reference_url":"https://security.archlinux.org/ASA-201803-16","reference_id":"ASA-201803-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-16"},{"reference_url":"https://security.archlinux.org/ASA-201803-17","reference_id":"ASA-201803-17","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-17"},{"reference_url":"https://security.archlinux.org/ASA-201803-18","reference_id":"ASA-201803-18","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-18"},{"reference_url":"https://security.archlinux.org/ASA-201803-19","reference_id":"ASA-201803-19","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-19"},{"reference_url":"https://security.archlinux.org/ASA-201803-20","reference_id":"ASA-201803-20","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-20"},{"reference_url":"https://security.archlinux.org/AVG-653","reference_id":"AVG-653","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-653"},{"reference_url":"https://security.archlinux.org/AVG-654","reference_id":"AVG-654","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-654"},{"reference_url":"https://security.archlinux.org/AVG-655","reference_id":"AVG-655","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-655"},{"reference_url":"https://security.archlinux.org/AVG-656","reference_id":"AVG-656","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-656"},{"reference_url":"https://security.archlinux.org/AVG-660","reference_id":"AVG-660","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-660"},{"reference_url":"https://security.archlinux.org/AVG-661","reference_id":"AVG-661","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-661"},{"reference_url":"https://security.gentoo.org/glsa/201804-04","reference_id":"GLSA-201804-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582786?format=json","purl":"pkg:deb/debian/curl@7.60.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.60.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2018-1000121"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bv57-gvfs-qfhj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89213?format=json","vulnerability_id":"VCID-bvgs-71kb-mbcx","summary":"security flaw","references":[{"reference_url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000940","reference_id":"","reference_type":"","scores":[],"url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000940"},{"reference_url":"http://marc.info/?l=full-disclosure&m=110959085507755&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=full-disclosure&m=110959085507755&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0490.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0490.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0490","reference_id":"","reference_type":"","scores":[{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85611","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85578","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85599","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.8561","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85483","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85495","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85512","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85516","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85536","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85545","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.8556","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85557","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85553","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85577","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85582","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0490"},{"reference_url":"https://curl.se/docs/CVE-2005-0490.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2005-0490.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0490"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19423","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19423"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml"},{"reference_url":"http://www.idefense.com/application/poi/display?id=202&type=vulnerabilities","reference_id":"","reference_type":"","scores":[],"url":"http://www.idefense.com/application/poi/display?id=202&type=vulnerabilities"},{"reference_url":"http://www.idefense.com/application/poi/display?id=203&type=vulnerabilities","reference_id":"","reference_type":"","scores":[],"url":"http://www.idefense.com/application/poi/display?id=203&type=vulnerabilities"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:048","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:048"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_11_curl.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_11_curl.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-340.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-340.html"},{"reference_url":"http://www.securityfocus.com/bid/12615","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/12615"},{"reference_url":"http://www.securityfocus.com/bid/12616","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/12616"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617532","reference_id":"1617532","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617532"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0490","reference_id":"CVE-2005-0490","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:340","reference_id":"RHSA-2005:340","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:340"},{"reference_url":"https://usn.ubuntu.com/86-1/","reference_id":"USN-86-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/86-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586281?format=json","purl":"pkg:deb/debian/curl@7.13.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.13.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2005-0490"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bvgs-71kb-mbcx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57270?format=json","vulnerability_id":"VCID-bz4u-6rft-s3a8","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38039.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38039.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38039","reference_id":"","reference_type":"","scores":[{"value":"0.12305","scoring_system":"epss","scoring_elements":"0.93847","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12305","scoring_system":"epss","scoring_elements":"0.9386","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12305","scoring_system":"epss","scoring_elements":"0.93856","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12305","scoring_system":"epss","scoring_elements":"0.93845","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12305","scoring_system":"epss","scoring_elements":"0.93835","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12305","scoring_system":"epss","scoring_elements":"0.93892","published_at":"2026-04-29T12:55:00Z"},{"value":"0.12305","scoring_system":"epss","scoring_elements":"0.93896","published_at":"2026-04-24T12:55:00Z"},{"value":"0.12305","scoring_system":"epss","scoring_elements":"0.93894","published_at":"2026-04-26T12:55:00Z"},{"value":"0.12305","scoring_system":"epss","scoring_elements":"0.93893","published_at":"2026-04-18T12:55:00Z"},{"value":"0.12305","scoring_system":"epss","scoring_elements":"0.93887","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12305","scoring_system":"epss","scoring_elements":"0.93865","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38039"},{"reference_url":"https://curl.se/docs/CVE-2023-38039.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-38039.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/2072338","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"}],"url":"https://hackerone.com/reports/2072338"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/17","reference_id":"17","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/17"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2239135","reference_id":"2239135","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2239135"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/34","reference_id":"34","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/34"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/37","reference_id":"37","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/37"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/38","reference_id":"38","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/38"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/","reference_id":"5DCZMYODALBLVOXVJEN2LF2MLANEYL4F","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://support.apple.com/kb/HT214036","reference_id":"HT214036","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"}],"url":"https://support.apple.com/kb/HT214036"},{"reference_url":"https://support.apple.com/kb/HT214057","reference_id":"HT214057","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"}],"url":"https://support.apple.com/kb/HT214057"},{"reference_url":"https://support.apple.com/kb/HT214058","reference_id":"HT214058","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"}],"url":"https://support.apple.com/kb/HT214058"},{"reference_url":"https://support.apple.com/kb/HT214063","reference_id":"HT214063","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"}],"url":"https://support.apple.com/kb/HT214063"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/","reference_id":"M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231013-0005/","reference_id":"ntap-20231013-0005","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231013-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7625","reference_id":"RHSA-2023:7625","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7625"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7626","reference_id":"RHSA-2023:7626","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7626"},{"reference_url":"https://www.insyde.com/security-pledge/SA-2023064","reference_id":"SA-2023064","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"}],"url":"https://www.insyde.com/security-pledge/SA-2023064"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/","reference_id":"TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:17:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/"},{"reference_url":"https://usn.ubuntu.com/6363-1/","reference_id":"USN-6363-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6363-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/586888?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/586889?format=json","purl":"pkg:deb/debian/curl@8.3.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.3.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2023-38039"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bz4u-6rft-s3a8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56000?format=json","vulnerability_id":"VCID-c2na-7q9e-47am","summary":"information disclosure","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0015.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0015.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0015","reference_id":"","reference_type":"","scores":[{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80477","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80459","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80342","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80348","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80368","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80357","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80386","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80396","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80415","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.804","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80393","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80422","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80423","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80427","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80453","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0015"},{"reference_url":"https://curl.se/docs/CVE-2014-0015.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2014-0015.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1053903","reference_id":"1053903","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1053903"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0561","reference_id":"RHSA-2014:0561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0561"},{"reference_url":"https://usn.ubuntu.com/2097-1/","reference_id":"USN-2097-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2097-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/587022?format=json","purl":"pkg:deb/debian/curl@7.35.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.35.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2014-0015"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c2na-7q9e-47am"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34704?format=json","vulnerability_id":"VCID-c6dk-7gj6-7far","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8623.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8623.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8623","reference_id":"","reference_type":"","scores":[{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74653","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74617","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74707","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74621","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74647","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74667","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.7469","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.7467","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74662","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74699","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.7523","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01197","scoring_system":"epss","scoring_elements":"0.78941","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01197","scoring_system":"epss","scoring_elements":"0.78965","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01197","scoring_system":"epss","scoring_elements":"0.78949","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8623"},{"reference_url":"https://curl.se/docs/CVE-2016-8623.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8623.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037192","reference_id":"1037192","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/"}],"url":"http://www.securitytracker.com/id/1037192"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388388","reference_id":"1388388","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388388"},{"reference_url":"http://www.securityfocus.com/bid/94106","reference_id":"94106","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/"}],"url":"http://www.securityfocus.com/bid/94106"},{"reference_url":"https://curl.haxx.se/docs/adv_20161102I.html","reference_id":"adv_20161102I.html","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/"}],"url":"https://curl.haxx.se/docs/adv_20161102I.html"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://curl.haxx.se/CVE-2016-8623.patch","reference_id":"CVE-2016-8623.patch","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/"}],"url":"https://curl.haxx.se/CVE-2016-8623.patch"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/"}],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623","reference_id":"show_bug.cgi?id=CVE-2016-8623","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583608?format=json","purl":"pkg:deb/debian/curl@7.51.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-8623"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c6dk-7gj6-7far"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/16997?format=json","vulnerability_id":"VCID-cbah-e86c-w3fj","summary":"Improper Authentication\nAn authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However, certain FTP settings such as CURLOPT_FTP_ACCOUNT, CURLOPT_FTP_ALTERNATIVE_TO_USER, CURLOPT_FTP_SSL_CCC, and CURLOPT_USE_SSL were not included in the configuration match checks, causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer, potentially allowing unauthorized access to sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27535.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27535.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27535","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10679","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10803","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10758","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10742","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20236","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2017","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20251","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20311","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20341","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20295","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20226","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20386","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20231","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20446","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27535"},{"reference_url":"https://curl.se/docs/CVE-2023-27535.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-27535.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27535","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27535"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1892780","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/"}],"url":"https://hackerone.com/reports/1892780"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179073","reference_id":"2179073","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179073"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/","reference_id":"36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27535","reference_id":"CVE-2023-27535","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27535"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html","reference_id":"msg00025.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230420-0010/","reference_id":"ntap-20230420-0010","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-03T18:24:11Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230420-0010/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2650","reference_id":"RHSA-2023:2650","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2650"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3106","reference_id":"RHSA-2023:3106","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3106"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0428","reference_id":"RHSA-2024:0428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0428"},{"reference_url":"https://usn.ubuntu.com/5964-1/","reference_id":"USN-5964-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5964-1/"},{"reference_url":"https://usn.ubuntu.com/5964-2/","reference_id":"USN-5964-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5964-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584288?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584289?format=json","purl":"pkg:deb/debian/curl@7.88.1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2023-27535"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cbah-e86c-w3fj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49702?format=json","vulnerability_id":"VCID-cbph-fu9d-gbah","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000122.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000122.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000122","reference_id":"","reference_type":"","scores":[{"value":"0.01942","scoring_system":"epss","scoring_elements":"0.83368","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01942","scoring_system":"epss","scoring_elements":"0.83503","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01942","scoring_system":"epss","scoring_elements":"0.83445","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01942","scoring_system":"epss","scoring_elements":"0.83439","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01942","scoring_system":"epss","scoring_elements":"0.83435","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01942","scoring_system":"epss","scoring_elements":"0.8347","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01942","scoring_system":"epss","scoring_elements":"0.83471","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01942","scoring_system":"epss","scoring_elements":"0.83472","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01942","scoring_system":"epss","scoring_elements":"0.83494","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01942","scoring_system":"epss","scoring_elements":"0.83501","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01942","scoring_system":"epss","scoring_elements":"0.83381","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01942","scoring_system":"epss","scoring_elements":"0.83396","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01942","scoring_system":"epss","scoring_elements":"0.8342","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01942","scoring_system":"epss","scoring_elements":"0.8343","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000122"},{"reference_url":"https://curl.se/docs/CVE-2018-1000122.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2018-1000122.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1553398","reference_id":"1553398","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1553398"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546","reference_id":"893546","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546"},{"reference_url":"https://security.archlinux.org/ASA-201803-15","reference_id":"ASA-201803-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-15"},{"reference_url":"https://security.archlinux.org/ASA-201803-16","reference_id":"ASA-201803-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-16"},{"reference_url":"https://security.archlinux.org/ASA-201803-17","reference_id":"ASA-201803-17","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-17"},{"reference_url":"https://security.archlinux.org/ASA-201803-18","reference_id":"ASA-201803-18","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-18"},{"reference_url":"https://security.archlinux.org/ASA-201803-19","reference_id":"ASA-201803-19","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-19"},{"reference_url":"https://security.archlinux.org/ASA-201803-20","reference_id":"ASA-201803-20","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-20"},{"reference_url":"https://security.archlinux.org/AVG-653","reference_id":"AVG-653","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-653"},{"reference_url":"https://security.archlinux.org/AVG-654","reference_id":"AVG-654","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-654"},{"reference_url":"https://security.archlinux.org/AVG-655","reference_id":"AVG-655","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-655"},{"reference_url":"https://security.archlinux.org/AVG-656","reference_id":"AVG-656","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-656"},{"reference_url":"https://security.archlinux.org/AVG-660","reference_id":"AVG-660","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-660"},{"reference_url":"https://security.archlinux.org/AVG-661","reference_id":"AVG-661","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-661"},{"reference_url":"https://security.gentoo.org/glsa/201804-04","reference_id":"GLSA-201804-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582786?format=json","purl":"pkg:deb/debian/curl@7.60.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.60.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2018-1000122"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cbph-fu9d-gbah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46198?format=json","vulnerability_id":"VCID-cp4n-p2z3-43b4","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in information disclosure or data loss.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8177.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8177.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8177","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05237","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05283","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05013","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05279","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05476","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05479","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05514","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05549","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0557","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05545","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05532","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05444","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05486","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05526","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8177"},{"reference_url":"https://curl.se/docs/CVE-2020-8177.html","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T21:05:17Z/"}],"url":"https://curl.se/docs/CVE-2020-8177.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/887462","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T21:05:17Z/"}],"url":"https://hackerone.com/reports/887462"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1847915","reference_id":"1847915","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1847915"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965281","reference_id":"965281","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965281"},{"reference_url":"https://security.archlinux.org/AVG-1194","reference_id":"AVG-1194","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1194"},{"reference_url":"https://www.debian.org/security/2021/dsa-4881","reference_id":"dsa-4881","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T21:05:17Z/"}],"url":"https://www.debian.org/security/2021/dsa-4881"},{"reference_url":"https://security.gentoo.org/glsa/202007-16","reference_id":"GLSA-202007-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4599","reference_id":"RHSA-2020:4599","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4599"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5002","reference_id":"RHSA-2020:5002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5417","reference_id":"RHSA-2020:5417","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5417"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0949","reference_id":"RHSA-2021:0949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0949"},{"reference_url":"https://usn.ubuntu.com/4402-1/","reference_id":"USN-4402-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4402-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583866?format=json","purl":"pkg:deb/debian/curl@7.72.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.72.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2020-8177"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cp4n-p2z3-43b4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80257?format=json","vulnerability_id":"VCID-d3s1-3qs7-2uhw","summary":"curl: Cipher settings shared for all connections when using schannel TLS backed","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22897.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22897.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22897","reference_id":"","reference_type":"","scores":[{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73845","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73979","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73971","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.7398","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73855","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.7388","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73851","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73886","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73899","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73921","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73903","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73894","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73936","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73945","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00791","scoring_system":"epss","scoring_elements":"0.73937","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22897"},{"reference_url":"https://curl.se/docs/CVE-2021-22897.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2021-22897.html"},{"reference_url":"https://hackerone.com/reports/1172857","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/1172857"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1964904","reference_id":"1964904","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1964904"},{"reference_url":"https://security.archlinux.org/AVG-2016","reference_id":"AVG-2016","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2016"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2021-22897"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d3s1-3qs7-2uhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57267?format=json","vulnerability_id":"VCID-ddgz-rczw-jqfw","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28320.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28320.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28320","reference_id":"","reference_type":"","scores":[{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67593","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67504","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67581","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67546","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67579","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67592","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.6757","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67526","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67556","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00641","scoring_system":"epss","scoring_elements":"0.70682","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00641","scoring_system":"epss","scoring_elements":"0.70622","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00641","scoring_system":"epss","scoring_elements":"0.70673","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28320"},{"reference_url":"https://curl.se/docs/CVE-2023-28320.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-28320.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28320"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1929597","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"https://hackerone.com/reports/1929597"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239","reference_id":"1036239","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196783","reference_id":"2196783","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196783"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/47","reference_id":"47","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/47"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/48","reference_id":"48","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/48"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/52","reference_id":"52","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/52"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://support.apple.com/kb/HT213843","reference_id":"HT213843","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"https://support.apple.com/kb/HT213843"},{"reference_url":"https://support.apple.com/kb/HT213844","reference_id":"HT213844","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"https://support.apple.com/kb/HT213844"},{"reference_url":"https://support.apple.com/kb/HT213845","reference_id":"HT213845","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"https://support.apple.com/kb/HT213845"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230609-0009/","reference_id":"ntap-20230609-0009","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230609-0009/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583792?format=json","purl":"pkg:deb/debian/curl@7.88.1-10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2023-28320"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ddgz-rczw-jqfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/15716?format=json","vulnerability_id":"VCID-dgtq-eaav-jyhf","summary":"Out-of-bounds Write\nA buffer overflow exists in curl 7.12.3 to and including curl 7.58.0 in the FTP URL handling that allows an attacker to cause a denial of service or worse.","references":[{"reference_url":"https://access.redhat.com/errata/RHBA-2019:0327","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHBA-2019:0327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3157","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2018:3157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3558","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2018:3558"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1543","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2019:1543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0544","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2020:0544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0594","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2020:0594"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000120.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000120.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000120","reference_id":"","reference_type":"","scores":[{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81438","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81302","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81312","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81334","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81332","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81361","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81366","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81387","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81372","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81365","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81402","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81403","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81426","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0154","scoring_system":"epss","scoring_elements":"0.81434","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000120"},{"reference_url":"https://curl.haxx.se/docs/adv_2018-9cd6.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://curl.haxx.se/docs/adv_2018-9cd6.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/coapp-packages/curl","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/coapp-packages/curl"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/03/msg00012.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.debian.org/debian-lts-announce/2018/03/msg00012.html"},{"reference_url":"https://usn.ubuntu.com/3598-1","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://usn.ubuntu.com/3598-1"},{"reference_url":"https://usn.ubuntu.com/3598-1/","reference_id":"","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3598-1/"},{"reference_url":"https://usn.ubuntu.com/3598-2","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://usn.ubuntu.com/3598-2"},{"reference_url":"https://usn.ubuntu.com/3598-2/","reference_id":"","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3598-2/"},{"reference_url":"https://web.archive.org/web/20201220134105/http://www.securitytracker.com/id/1040531","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20201220134105/http://www.securitytracker.com/id/1040531"},{"reference_url":"https://web.archive.org/web/20201220134609/http://www.securityfocus.com/bid/103414","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20201220134609/http://www.securityfocus.com/bid/103414"},{"reference_url":"https://www.debian.org/security/2018/dsa-4136","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.debian.org/security/2018/dsa-4136"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1552628","reference_id":"1552628","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1552628"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546","reference_id":"893546","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893546"},{"reference_url":"https://security.archlinux.org/ASA-201803-15","reference_id":"ASA-201803-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-15"},{"reference_url":"https://security.archlinux.org/ASA-201803-16","reference_id":"ASA-201803-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-16"},{"reference_url":"https://security.archlinux.org/ASA-201803-17","reference_id":"ASA-201803-17","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-17"},{"reference_url":"https://security.archlinux.org/ASA-201803-18","reference_id":"ASA-201803-18","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-18"},{"reference_url":"https://security.archlinux.org/ASA-201803-19","reference_id":"ASA-201803-19","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-19"},{"reference_url":"https://security.archlinux.org/ASA-201803-20","reference_id":"ASA-201803-20","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201803-20"},{"reference_url":"https://security.archlinux.org/AVG-653","reference_id":"AVG-653","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-653"},{"reference_url":"https://security.archlinux.org/AVG-654","reference_id":"AVG-654","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-654"},{"reference_url":"https://security.archlinux.org/AVG-655","reference_id":"AVG-655","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-655"},{"reference_url":"https://security.archlinux.org/AVG-656","reference_id":"AVG-656","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-656"},{"reference_url":"https://security.archlinux.org/AVG-660","reference_id":"AVG-660","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-660"},{"reference_url":"https://security.archlinux.org/AVG-661","reference_id":"AVG-661","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-661"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000120","reference_id":"CVE-2018-1000120","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000120"},{"reference_url":"https://curl.se/docs/CVE-2018-1000120.html","reference_id":"CVE-2018-1000120.HTML","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2018-1000120.html"},{"reference_url":"https://github.com/advisories/GHSA-674j-7m97-j2p9","reference_id":"GHSA-674j-7m97-j2p9","reference_type":"","scores":[{"value":"CRITICAL","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-674j-7m97-j2p9"},{"reference_url":"https://security.gentoo.org/glsa/201804-04","reference_id":"GLSA-201804-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582786?format=json","purl":"pkg:deb/debian/curl@7.60.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.60.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2018-1000120","GHSA-674j-7m97-j2p9"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dgtq-eaav-jyhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47224?format=json","vulnerability_id":"VCID-dhrf-2sz5-3bhf","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which may lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5481.json","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5481.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5481","reference_id":"","reference_type":"","scores":[{"value":"0.03017","scoring_system":"epss","scoring_elements":"0.8661","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03017","scoring_system":"epss","scoring_elements":"0.86617","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03017","scoring_system":"epss","scoring_elements":"0.86629","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03017","scoring_system":"epss","scoring_elements":"0.86622","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03017","scoring_system":"epss","scoring_elements":"0.86623","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03435","scoring_system":"epss","scoring_elements":"0.87515","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03435","scoring_system":"epss","scoring_elements":"0.87509","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03435","scoring_system":"epss","scoring_elements":"0.87516","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04042","scoring_system":"epss","scoring_elements":"0.88503","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04042","scoring_system":"epss","scoring_elements":"0.88497","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04042","scoring_system":"epss","scoring_elements":"0.88479","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04042","scoring_system":"epss","scoring_elements":"0.88476","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04042","scoring_system":"epss","scoring_elements":"0.8846","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04042","scoring_system":"epss","scoring_elements":"0.88452","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04042","scoring_system":"epss","scoring_elements":"0.88514","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5481"},{"reference_url":"https://curl.se/docs/CVE-2019-5481.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2019-5481.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/686823","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/686823"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1749402","reference_id":"1749402","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1749402"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940009","reference_id":"940009","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940009"},{"reference_url":"https://security.archlinux.org/AVG-1982","reference_id":"AVG-1982","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1982"},{"reference_url":"https://curl.haxx.se/docs/CVE-2019-5481.html","reference_id":"CVE-2019-5481.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-16T14:07:56Z/"}],"url":"https://curl.haxx.se/docs/CVE-2019-5481.html"},{"reference_url":"https://security.gentoo.org/glsa/202003-29","reference_id":"GLSA-202003-29","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-16T14:07:56Z/"}],"url":"https://security.gentoo.org/glsa/202003-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0250","reference_id":"RHSA-2020:0250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1792","reference_id":"RHSA-2020:1792","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1792"},{"reference_url":"https://usn.ubuntu.com/4129-1/","reference_id":"USN-4129-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4129-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585101?format=json","purl":"pkg:deb/debian/curl@7.66.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.66.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2019-5481"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dhrf-2sz5-3bhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46646?format=json","vulnerability_id":"VCID-dj5e-62rt-hkex","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which might allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0734.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0734.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0734","reference_id":"","reference_type":"","scores":[{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89482","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.8941","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89425","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89427","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89443","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89446","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89455","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89453","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89449","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89464","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89465","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89462","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89477","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89481","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0734"},{"reference_url":"https://curl.se/docs/CVE-2010-0734.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2010-0734.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0734"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=563220","reference_id":"563220","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=563220"},{"reference_url":"https://security.gentoo.org/glsa/201203-02","reference_id":"GLSA-201203-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201203-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0273","reference_id":"RHSA-2010:0273","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0273"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0329","reference_id":"RHSA-2010:0329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0329"},{"reference_url":"https://usn.ubuntu.com/1158-1/","reference_id":"USN-1158-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1158-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584864?format=json","purl":"pkg:deb/debian/curl@7.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.20.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2010-0734"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dj5e-62rt-hkex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59718?format=json","vulnerability_id":"VCID-drkp-q9r5-ukcm","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8818.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8818.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8818","reference_id":"","reference_type":"","scores":[{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68167","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68207","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.6819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68185","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68236","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00559","scoring_system":"epss","scoring_elements":"0.68251","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00729","scoring_system":"epss","scoring_elements":"0.72666","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00729","scoring_system":"epss","scoring_elements":"0.72693","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00729","scoring_system":"epss","scoring_elements":"0.72682","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00729","scoring_system":"epss","scoring_elements":"0.72639","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00729","scoring_system":"epss","scoring_elements":"0.72685","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00729","scoring_system":"epss","scoring_elements":"0.72649","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00729","scoring_system":"epss","scoring_elements":"0.72726","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00729","scoring_system":"epss","scoring_elements":"0.72735","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00729","scoring_system":"epss","scoring_elements":"0.72731","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8818"},{"reference_url":"https://curl.haxx.se/docs/adv_2017-af0a.html","reference_id":"","reference_type":"","scores":[],"url":"https://curl.haxx.se/docs/adv_2017-af0a.html"},{"reference_url":"https://curl.se/docs/CVE-2017-8818.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2017-8818.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8818","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8818"},{"reference_url":"http://security.cucumberlinux.com/security/details.php?id=163","reference_id":"","reference_type":"","scores":[],"url":"http://security.cucumberlinux.com/security/details.php?id=163"},{"reference_url":"http://www.securityfocus.com/bid/102014","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/102014"},{"reference_url":"http://www.securitytracker.com/id/1039898","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039898"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1517691","reference_id":"1517691","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1517691"},{"reference_url":"https://security.archlinux.org/ASA-201711-36","reference_id":"ASA-201711-36","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-36"},{"reference_url":"https://security.archlinux.org/ASA-201711-37","reference_id":"ASA-201711-37","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-37"},{"reference_url":"https://security.archlinux.org/ASA-201711-38","reference_id":"ASA-201711-38","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-38"},{"reference_url":"https://security.archlinux.org/AVG-521","reference_id":"AVG-521","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-521"},{"reference_url":"https://security.archlinux.org/AVG-522","reference_id":"AVG-522","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-522"},{"reference_url":"https://security.archlinux.org/AVG-523","reference_id":"AVG-523","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-523"},{"reference_url":"https://security.archlinux.org/AVG-527","reference_id":"AVG-527","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-527"},{"reference_url":"https://security.archlinux.org/AVG-528","reference_id":"AVG-528","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-528"},{"reference_url":"https://security.archlinux.org/AVG-529","reference_id":"AVG-529","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-529"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.56.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.56.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.56.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.56.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.56.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.56.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.56.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.56.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.56.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.56.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.56.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.56.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8818","reference_id":"CVE-2017-8818","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8818"},{"reference_url":"https://security.gentoo.org/glsa/201712-04","reference_id":"GLSA-201712-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201712-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585790?format=json","purl":"pkg:deb/debian/curl@7.57.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.57.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2017-8818"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-drkp-q9r5-ukcm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34687?format=json","vulnerability_id":"VCID-dzzd-afgu-3fcy","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8150.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8150.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8150","reference_id":"","reference_type":"","scores":[{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79241","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79112","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79119","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79144","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79129","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79153","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79161","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79185","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.7917","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79187","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79184","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79219","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79225","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8150"},{"reference_url":"https://curl.se/docs/CVE-2014-8150.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2014-8150.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1178692","reference_id":"1178692","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1178692"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1254","reference_id":"RHSA-2015:1254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1254"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2159","reference_id":"RHSA-2015:2159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2159"},{"reference_url":"https://usn.ubuntu.com/2474-1/","reference_id":"USN-2474-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2474-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583314?format=json","purl":"pkg:deb/debian/curl@7.38.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.38.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2014-8150"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dzzd-afgu-3fcy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40939?format=json","vulnerability_id":"VCID-e1yx-dxa6-1bba","summary":"Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3389.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3389.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3389","reference_id":"","reference_type":"","scores":[{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88099","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88165","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88159","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.8816","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88174","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88172","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88108","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88124","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88131","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.8815","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88156","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03933","scoring_system":"epss","scoring_elements":"0.88364","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03933","scoring_system":"epss","scoring_elements":"0.88358","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03933","scoring_system":"epss","scoring_elements":"0.88362","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3389"},{"reference_url":"https://curl.se/docs/CVE-2011-3389.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2011-3389.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=737506","reference_id":"737506","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=737506"},{"reference_url":"https://security.gentoo.org/glsa/201111-02","reference_id":"GLSA-201111-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-02"},{"reference_url":"https://security.gentoo.org/glsa/201203-02","reference_id":"GLSA-201203-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201203-02"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1380","reference_id":"RHSA-2011:1380","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1380"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1384","reference_id":"RHSA-2011:1384","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1384"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0006","reference_id":"RHSA-2012:0006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0034","reference_id":"RHSA-2012:0034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0343","reference_id":"RHSA-2012:0343","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0508","reference_id":"RHSA-2012:0508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://usn.ubuntu.com/1263-1/","reference_id":"USN-1263-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1263-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582527?format=json","purl":"pkg:deb/debian/curl@7.24.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.24.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2011-3389"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e1yx-dxa6-1bba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34705?format=json","vulnerability_id":"VCID-e58m-g37d-9fd6","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8624.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8624.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8624","reference_id":"","reference_type":"","scores":[{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.8003","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80023","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80104","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80078","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80098","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80082","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80073","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80102","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80052","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80042","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80069","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80366","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80372","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80389","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8624"},{"reference_url":"https://curl.se/docs/CVE-2016-8624.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8624.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037192","reference_id":"1037192","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/"}],"url":"http://www.securitytracker.com/id/1037192"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388390","reference_id":"1388390","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388390"},{"reference_url":"http://www.securityfocus.com/bid/94103","reference_id":"94103","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/"}],"url":"http://www.securityfocus.com/bid/94103"},{"reference_url":"https://curl.haxx.se/docs/adv_20161102J.html","reference_id":"adv_20161102J.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/"}],"url":"https://curl.haxx.se/docs/adv_20161102J.html"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/"}],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5%40%3Ccommits.pulsar.apache.org%3E","reference_id":"rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5%40%3Ccommits.pulsar.apache.org%3E","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/"}],"url":"https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5%40%3Ccommits.pulsar.apache.org%3E"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624","reference_id":"show_bug.cgi?id=CVE-2016-8624","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583608?format=json","purl":"pkg:deb/debian/curl@7.51.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-8624"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e58m-g37d-9fd6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34690?format=json","vulnerability_id":"VCID-eap9-v2gp-fqgh","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3739.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3739.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3739","reference_id":"","reference_type":"","scores":[{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77797","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77772","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77781","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77652","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77659","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77686","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77669","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77696","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77702","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77728","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77712","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77711","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77748","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.77747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01068","scoring_system":"epss","scoring_elements":"0.7774","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3739"},{"reference_url":"https://curl.haxx.se/changes.html#7_49_0","reference_id":"","reference_type":"","scores":[],"url":"https://curl.haxx.se/changes.html#7_49_0"},{"reference_url":"https://curl.haxx.se/CVE-2016-3739.patch","reference_id":"","reference_type":"","scores":[],"url":"https://curl.haxx.se/CVE-2016-3739.patch"},{"reference_url":"https://curl.haxx.se/docs/adv_20160518.html","reference_id":"","reference_type":"","scores":[],"url":"https://curl.haxx.se/docs/adv_20160518.html"},{"reference_url":"https://curl.se/docs/CVE-2016-3739.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-3739.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3739"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/27/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2024/03/27/4"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"reference_url":"http://www.securityfocus.com/bid/90726","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/90726"},{"reference_url":"http://www.securitytracker.com/id/1035907","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035907"},{"reference_url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.495349","reference_id":"","reference_type":"","scores":[],"url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.495349"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1335430","reference_id":"1335430","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1335430"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.38.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.39.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.40.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.41.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.43.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.44.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.45.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.46.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.47.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.48.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3739","reference_id":"CVE-2016-3739","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:P/A:N"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3739"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584626?format=json","purl":"pkg:deb/debian/curl@7.50.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.50.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-3739"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eap9-v2gp-fqgh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57774?format=json","vulnerability_id":"VCID-eer3-29q8-sbgq","summary":"security update","references":[{"reference_url":"http://curl.haxx.se/docs/adv_20141105.html","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/docs/adv_20141105.html"},{"reference_url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743","reference_id":"","reference_type":"","scores":[],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743"},{"reference_url":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-02/msg00040.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1254.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1254.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3707.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3707.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3707","reference_id":"","reference_type":"","scores":[{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43179","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43257","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43274","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43331","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43359","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43296","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43348","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43363","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43384","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43352","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43337","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43397","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43386","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43321","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43255","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3707"},{"reference_url":"https://curl.se/docs/CVE-2014-3707.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2014-3707.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707"},{"reference_url":"https://support.apple.com/kb/HT205031","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT205031"},{"reference_url":"http://www.debian.org/security/2014/dsa-3069","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3069"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/70988","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70988"},{"reference_url":"http://www.ubuntu.com/usn/USN-2399-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2399-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1154941","reference_id":"1154941","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1154941"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion:11.1.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:hyperion:11.1.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion:11.1.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion:11.1.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:hyperion:11.1.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion:11.1.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3707","reference_id":"CVE-2014-3707","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3707"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1254","reference_id":"RHSA-2015:1254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1254"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2159","reference_id":"RHSA-2015:2159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2159"},{"reference_url":"https://usn.ubuntu.com/2399-1/","reference_id":"USN-2399-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2399-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586404?format=json","purl":"pkg:deb/debian/curl@7.38.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.38.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2014-3707"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eer3-29q8-sbgq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49281?format=json","vulnerability_id":"VCID-ej47-4dcu-5fhy","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42915.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42915.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42915","reference_id":"","reference_type":"","scores":[{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64478","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64436","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64407","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64442","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64454","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64447","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64467","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.6448","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70128","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70143","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00812","scoring_system":"epss","scoring_elements":"0.7425","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00812","scoring_system":"epss","scoring_elements":"0.74272","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00812","scoring_system":"epss","scoring_elements":"0.74203","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00812","scoring_system":"epss","scoring_elements":"0.74235","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42915"},{"reference_url":"https://curl.se/docs/CVE-2022-42915.html","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"}],"url":"https://curl.se/docs/CVE-2022-42915.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1722065","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/1722065"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jan/19","reference_id":"19","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jan/19"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jan/20","reference_id":"20","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jan/20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2135413","reference_id":"2135413","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2135413"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/","reference_id":"37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://support.apple.com/kb/HT213604","reference_id":"HT213604","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"}],"url":"https://support.apple.com/kb/HT213604"},{"reference_url":"https://support.apple.com/kb/HT213605","reference_id":"HT213605","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"}],"url":"https://support.apple.com/kb/HT213605"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/","reference_id":"HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221209-0010/","reference_id":"ntap-20221209-0010","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221209-0010/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/","reference_id":"Q27V5YYMXUVI6PRZQVECON32XPVWTKDK","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T13:58:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8840","reference_id":"RHSA-2022:8840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8841","reference_id":"RHSA-2022:8841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8841"},{"reference_url":"https://usn.ubuntu.com/5702-1/","reference_id":"USN-5702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583300?format=json","purl":"pkg:deb/debian/curl@7.86.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.86.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2022-42915"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ej47-4dcu-5fhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86139?format=json","vulnerability_id":"VCID-ekav-zg3k-v3ea","summary":"curl: cookies accepted for TLDs","references":[{"reference_url":"http://curl.haxx.se/docs/adv_20140910B.html","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/docs/adv_20140910B.html"},{"reference_url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743","reference_id":"","reference_type":"","scores":[],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743"},{"reference_url":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3620.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3620.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3620","reference_id":"","reference_type":"","scores":[{"value":"0.01306","scoring_system":"epss","scoring_elements":"0.79853","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01306","scoring_system":"epss","scoring_elements":"0.79837","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01306","scoring_system":"epss","scoring_elements":"0.7972","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01306","scoring_system":"epss","scoring_elements":"0.79728","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01306","scoring_system":"epss","scoring_elements":"0.79749","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01306","scoring_system":"epss","scoring_elements":"0.79735","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01306","scoring_system":"epss","scoring_elements":"0.79764","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01306","scoring_system":"epss","scoring_elements":"0.7977","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01306","scoring_system":"epss","scoring_elements":"0.79792","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01306","scoring_system":"epss","scoring_elements":"0.79776","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01306","scoring_system":"epss","scoring_elements":"0.79769","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01306","scoring_system":"epss","scoring_elements":"0.79796","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01306","scoring_system":"epss","scoring_elements":"0.79798","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01306","scoring_system":"epss","scoring_elements":"0.79801","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01306","scoring_system":"epss","scoring_elements":"0.7983","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3620"},{"reference_url":"https://curl.se/docs/CVE-2014-3620.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2014-3620.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3620"},{"reference_url":"https://support.apple.com/kb/HT205031","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT205031"},{"reference_url":"http://www.debian.org/security/2014/dsa-3022","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3022"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/05/11/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2022/05/11/2"},{"reference_url":"http://www.securityfocus.com/bid/69742","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69742"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1138846","reference_id":"1138846","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1138846"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3620","reference_id":"CVE-2014-3620","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3620"},{"reference_url":"https://usn.ubuntu.com/2346-1/","reference_id":"USN-2346-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2346-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586725?format=json","purl":"pkg:deb/debian/curl@7.38.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.38.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2014-3620"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ekav-zg3k-v3ea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64300?format=json","vulnerability_id":"VCID-etzn-uhck-h7b2","summary":"curl: curl: Information disclosure via OAuth2 bearer token leakage during HTTP(S) redirect","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3783.json","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3783.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3783","reference_id":"","reference_type":"","scores":[{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0352","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03496","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03509","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03521","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03544","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.035","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.042","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04152","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04144","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04277","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04175","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06397","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06421","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06431","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3783"},{"reference_url":"https://curl.se/docs/CVE-2026-3783.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:25:28Z/"}],"url":"https://curl.se/docs/CVE-2026-3783.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3783","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3783"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/3583983","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:25:28Z/"}],"url":"https://hackerone.com/reports/3583983"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2446450","reference_id":"2446450","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2446450"},{"reference_url":"https://curl.se/docs/CVE-2026-3783.json","reference_id":"CVE-2026-3783.json","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:25:28Z/"}],"url":"https://curl.se/docs/CVE-2026-3783.json"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6893","reference_id":"RHSA-2026:6893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6893"},{"reference_url":"https://usn.ubuntu.com/8084-1/","reference_id":"USN-8084-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8084-1/"},{"reference_url":"https://usn.ubuntu.com/8099-1/","reference_id":"USN-8099-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8099-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2026-3783"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-etzn-uhck-h7b2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46647?format=json","vulnerability_id":"VCID-exhe-cmqf-duad","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which might allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2192.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2192.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2192","reference_id":"","reference_type":"","scores":[{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83933","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83795","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83808","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83823","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83825","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83849","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83855","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83872","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83866","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83861","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83894","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83895","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.8392","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83928","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2192"},{"reference_url":"https://curl.se/docs/CVE-2011-2192.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2011-2192.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2192","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2192"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=631615","reference_id":"631615","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=631615"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=711454","reference_id":"711454","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=711454"},{"reference_url":"https://security.gentoo.org/glsa/201203-02","reference_id":"GLSA-201203-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201203-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0918","reference_id":"RHSA-2011:0918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0918"},{"reference_url":"https://usn.ubuntu.com/1158-1/","reference_id":"USN-1158-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1158-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583763?format=json","purl":"pkg:deb/debian/curl@7.21.6-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.21.6-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2011-2192"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-exhe-cmqf-duad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91161?format=json","vulnerability_id":"VCID-f1aq-3cj8-gfbq","summary":"curl 7.x before 7.10.7 sends CONNECT proxy credentials to the remote server.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2003-1605","reference_id":"","reference_type":"","scores":[{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.5942","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59435","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59308","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59382","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59406","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59423","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59437","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59455","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59439","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59421","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59453","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59459","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.5944","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59415","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2003-1605"},{"reference_url":"https://curl.se/docs/CVE-2003-1605.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2003-1605.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1605","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1605"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586347?format=json","purl":"pkg:deb/debian/curl@7.10.7-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.10.7-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2003-1605"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f1aq-3cj8-gfbq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34707?format=json","vulnerability_id":"VCID-fnj3-2du1-4bhx","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3558","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:3558"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9586.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9586.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9586","reference_id":"","reference_type":"","scores":[{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75624","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.7562","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75582","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75596","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.7559","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75492","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75629","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75525","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75506","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75548","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75557","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75578","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75494","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9586"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586"},{"reference_url":"https://curl.haxx.se/docs/adv_20161221A.html","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"}],"url":"https://curl.haxx.se/docs/adv_20161221A.html"},{"reference_url":"https://curl.se/docs/CVE-2016-9586.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-9586.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:N/I:N/A:P"},{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"}],"url":"https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16"},{"reference_url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"}],"url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"}],"url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"reference_url":"http://www.securityfocus.com/bid/95019","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"}],"url":"http://www.securityfocus.com/bid/95019"},{"reference_url":"http://www.securitytracker.com/id/1037515","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"}],"url":"http://www.securitytracker.com/id/1037515"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1406712","reference_id":"1406712","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1406712"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848958","reference_id":"848958","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848958"},{"reference_url":"https://security.archlinux.org/ASA-201612-22","reference_id":"ASA-201612-22","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201612-22"},{"reference_url":"https://security.archlinux.org/ASA-201701-10","reference_id":"ASA-201701-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-10"},{"reference_url":"https://security.archlinux.org/ASA-201701-11","reference_id":"ASA-201701-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-11"},{"reference_url":"https://security.archlinux.org/ASA-201701-7","reference_id":"ASA-201701-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-7"},{"reference_url":"https://security.archlinux.org/ASA-201701-8","reference_id":"ASA-201701-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-8"},{"reference_url":"https://security.archlinux.org/ASA-201701-9","reference_id":"ASA-201701-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-9"},{"reference_url":"https://security.archlinux.org/AVG-112","reference_id":"AVG-112","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-112"},{"reference_url":"https://security.archlinux.org/AVG-113","reference_id":"AVG-113","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-113"},{"reference_url":"https://security.archlinux.org/AVG-114","reference_id":"AVG-114","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-114"},{"reference_url":"https://security.archlinux.org/AVG-115","reference_id":"AVG-115","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-115"},{"reference_url":"https://security.archlinux.org/AVG-116","reference_id":"AVG-116","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-116"},{"reference_url":"https://security.archlinux.org/AVG-117","reference_id":"AVG-117","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-117"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-9586","reference_id":"CVE-2016-9586","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-9586"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"}],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://usn.ubuntu.com/3441-1/","reference_id":"USN-3441-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3441-1/"},{"reference_url":"https://usn.ubuntu.com/3441-2/","reference_id":"USN-3441-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3441-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584923?format=json","purl":"pkg:deb/debian/curl@7.52.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.52.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-9586"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fnj3-2du1-4bhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94431?format=json","vulnerability_id":"VCID-fnr7-xb26-dbez","summary":"Integer overflow vulnerability in tool_operate.c in curl 7.65.2 via a large value as the retry delay. NOTE: many parties report that this has no direct security impact on the curl user; however, it may (in theory) cause a denial of service to associated systems or networks if, for example, --retry-delay is misinterpreted as a value much smaller than what was intended. This is not especially plausible because the overflow only happens if the user was trying to specify that curl should wait weeks (or longer) before trying to recover from a transient error.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-19909","reference_id":"","reference_type":"","scores":[{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04228","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04334","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04349","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04343","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04329","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04279","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04288","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04269","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.0429","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00017","scoring_system":"epss","scoring_elements":"0.04302","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04732","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04708","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04673","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04631","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-19909"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19909","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-19909"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/curl/curl/pull/4166","reference_id":"4166","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T18:11:17Z/"}],"url":"https://github.com/curl/curl/pull/4166"},{"reference_url":"https://daniel.haxx.se/blog/2023/08/26/cve-2020-19909-is-everything-that-is-wrong-with-cves/","reference_id":"cve-2020-19909-is-everything-that-is-wrong-with-cves","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-08T18:11:17Z/"}],"url":"https://daniel.haxx.se/blog/2023/08/26/cve-2020-19909-is-everything-that-is-wrong-with-cves/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585101?format=json","purl":"pkg:deb/debian/curl@7.66.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.66.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2020-19909"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fnr7-xb26-dbez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49713?format=json","vulnerability_id":"VCID-fp65-97n1-xuaj","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow attackers to bypass intended restrictions.","references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3558","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:34:47Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:3558"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000100.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000100.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000100","reference_id":"","reference_type":"","scores":[{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70307","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70305","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.703","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00818","scoring_system":"epss","scoring_elements":"0.74392","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00818","scoring_system":"epss","scoring_elements":"0.744","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76489","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76527","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76501","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76442","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.7654","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.765","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76506","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76447","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76475","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76457","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000100"},{"reference_url":"https://curl.haxx.se/docs/adv_20170809B.html","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:34:47Z/"}],"url":"https://curl.haxx.se/docs/adv_20170809B.html"},{"reference_url":"https://curl.se/docs/CVE-2017-1000100.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2017-1000100.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.5","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:P/I:N/A:N"},{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/HT208221","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:34:47Z/"}],"url":"https://support.apple.com/HT208221"},{"reference_url":"http://www.debian.org/security/2017/dsa-3992","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:34:47Z/"}],"url":"http://www.debian.org/security/2017/dsa-3992"},{"reference_url":"http://www.securityfocus.com/bid/100286","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:34:47Z/"}],"url":"http://www.securityfocus.com/bid/100286"},{"reference_url":"http://www.securitytracker.com/id/1039118","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:34:47Z/"}],"url":"http://www.securitytracker.com/id/1039118"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1478310","reference_id":"1478310","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1478310"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871555","reference_id":"871555","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871555"},{"reference_url":"https://security.archlinux.org/ASA-201708-16","reference_id":"ASA-201708-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201708-16"},{"reference_url":"https://security.archlinux.org/ASA-201710-3","reference_id":"ASA-201710-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-3"},{"reference_url":"https://security.archlinux.org/ASA-201710-4","reference_id":"ASA-201710-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-4"},{"reference_url":"https://security.archlinux.org/ASA-201710-5","reference_id":"ASA-201710-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-5"},{"reference_url":"https://security.archlinux.org/ASA-201710-6","reference_id":"ASA-201710-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-6"},{"reference_url":"https://security.archlinux.org/ASA-201710-7","reference_id":"ASA-201710-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-7"},{"reference_url":"https://security.archlinux.org/AVG-370","reference_id":"AVG-370","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-370"},{"reference_url":"https://security.archlinux.org/AVG-371","reference_id":"AVG-371","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-371"},{"reference_url":"https://security.archlinux.org/AVG-386","reference_id":"AVG-386","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-386"},{"reference_url":"https://security.archlinux.org/AVG-387","reference_id":"AVG-387","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-387"},{"reference_url":"https://security.archlinux.org/AVG-388","reference_id":"AVG-388","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-388"},{"reference_url":"https://security.archlinux.org/AVG-389","reference_id":"AVG-389","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-389"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000100","reference_id":"CVE-2017-1000100","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000100"},{"reference_url":"https://security.gentoo.org/glsa/201709-14","reference_id":"GLSA-201709-14","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:34:47Z/"}],"url":"https://security.gentoo.org/glsa/201709-14"},{"reference_url":"https://usn.ubuntu.com/3441-1/","reference_id":"USN-3441-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3441-1/"},{"reference_url":"https://usn.ubuntu.com/3441-2/","reference_id":"USN-3441-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3441-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585811?format=json","purl":"pkg:deb/debian/curl@7.55.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.55.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2017-1000100"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fp65-97n1-xuaj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61668?format=json","vulnerability_id":"VCID-frgg-29yv-dyf7","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22890.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22890.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22890","reference_id":"","reference_type":"","scores":[{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25887","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25644","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25952","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25993","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25764","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25834","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25885","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25854","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25797","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.258","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25782","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25755","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.257","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25692","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22890"},{"reference_url":"https://curl.se/docs/CVE-2021-22890.html","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:11:48Z/"}],"url":"https://curl.se/docs/CVE-2021-22890.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1129529","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:11:48Z/"}],"url":"https://hackerone.com/reports/1129529"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1941965","reference_id":"1941965","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1941965"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/","reference_id":"2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:11:48Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986270","reference_id":"986270","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986270"},{"reference_url":"https://security.archlinux.org/AVG-1753","reference_id":"AVG-1753","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1753"},{"reference_url":"https://security.archlinux.org/AVG-1754","reference_id":"AVG-1754","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1754"},{"reference_url":"https://security.archlinux.org/AVG-1755","reference_id":"AVG-1755","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1755"},{"reference_url":"https://security.archlinux.org/AVG-1756","reference_id":"AVG-1756","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1756"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22890","reference_id":"CVE-2021-22890","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22890"},{"reference_url":"https://security.gentoo.org/glsa/202105-36","reference_id":"GLSA-202105-36","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:11:48Z/"}],"url":"https://security.gentoo.org/glsa/202105-36"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/","reference_id":"ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:11:48Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/","reference_id":"KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:11:48Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210521-0007/","reference_id":"ntap-20210521-0007","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:11:48Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210521-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2471","reference_id":"RHSA-2021:2471","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2471"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2472","reference_id":"RHSA-2021:2472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2472"},{"reference_url":"https://usn.ubuntu.com/4898-1/","reference_id":"USN-4898-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4898-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583105?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2021-22890"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-frgg-29yv-dyf7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/354618?format=json","vulnerability_id":"VCID-g4jw-azg9-gqbs","summary":"","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5773.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5773.json"},{"reference_url":"https://curl.se/docs/CVE-2026-5773.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2026-5773.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5773","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5773"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/3650689","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/3650689"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2461201","reference_id":"2461201","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2461201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:12916","reference_id":"RHSA-2026:12916","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:12916"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2026-5773"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g4jw-azg9-gqbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61667?format=json","vulnerability_id":"VCID-ggt7-eejg-xfb6","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22876.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22876.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22876","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21003","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21131","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21078","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20928","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20925","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20987","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20845","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30201","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29849","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29919","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30034","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30106","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30149","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30169","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30153","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22876"},{"reference_url":"https://curl.se/docs/CVE-2021-22876.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"}],"url":"https://curl.se/docs/CVE-2021-22876.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1101882","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"}],"url":"https://hackerone.com/reports/1101882"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1941964","reference_id":"1941964","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1941964"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/","reference_id":"2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986269","reference_id":"986269","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986269"},{"reference_url":"https://security.archlinux.org/AVG-1753","reference_id":"AVG-1753","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1753"},{"reference_url":"https://security.archlinux.org/AVG-1754","reference_id":"AVG-1754","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1754"},{"reference_url":"https://security.archlinux.org/AVG-1755","reference_id":"AVG-1755","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1755"},{"reference_url":"https://security.archlinux.org/AVG-1756","reference_id":"AVG-1756","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1756"},{"reference_url":"https://security.archlinux.org/AVG-1757","reference_id":"AVG-1757","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1757"},{"reference_url":"https://security.archlinux.org/AVG-1758","reference_id":"AVG-1758","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1758"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22876","reference_id":"CVE-2021-22876","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22876"},{"reference_url":"https://security.gentoo.org/glsa/202105-36","reference_id":"GLSA-202105-36","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"}],"url":"https://security.gentoo.org/glsa/202105-36"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/","reference_id":"ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/","reference_id":"KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html","reference_id":"msg00019.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210521-0007/","reference_id":"ntap-20210521-0007","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210521-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2471","reference_id":"RHSA-2021:2471","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2471"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2472","reference_id":"RHSA-2021:2472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2472"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4511","reference_id":"RHSA-2021:4511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1354","reference_id":"RHSA-2022:1354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1354"},{"reference_url":"https://usn.ubuntu.com/4898-1/","reference_id":"USN-4898-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4898-1/"},{"reference_url":"https://usn.ubuntu.com/4903-1/","reference_id":"USN-4903-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4903-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583105?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2021-22876"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ggt7-eejg-xfb6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/19507?format=json","vulnerability_id":"VCID-gnx2-djyk-uyaf","summary":"Cookie injection with none file\nThis flaw allows an attacker to insert cookies at will into a running program\nusing libcurl, if the specific series of conditions are met.\n\nlibcurl performs transfers. In its API, an application creates \"easy handles\"\nthat are the individual handles for single transfers.\n\nlibcurl provides a function call that duplicates en easy handle called\n[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).\n\nIf a transfer has cookies enabled when the handle is duplicated, the\ncookie-enable state is also cloned - but without cloning the actual\ncookies. If the source handle does not read any cookies from a specific file on\ndisk, the cloned version of the handle would instead store the file name as\n`none` (using the four ASCII letters, no quotes).\n\nSubsequent use of the cloned handle that does not explicitly set a source to\nload cookies from would then inadvertently load cookies from a file named\n`none` - if such a file exists and is readable in the current directory of the\nprogram using libcurl. And if using the correct file format of course.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38546.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38546.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38546","reference_id":"","reference_type":"","scores":[{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.4895","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48964","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48991","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48944","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48998","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48995","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49012","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48985","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49036","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49032","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48994","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49733","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/2148242","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/2148242"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241938","reference_id":"2241938","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241938"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/34","reference_id":"34","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/34"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/37","reference_id":"37","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/37"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/38","reference_id":"38","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/38"},{"reference_url":"https://security.archlinux.org/AVG-2845","reference_id":"AVG-2845","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2845"},{"reference_url":"https://security.archlinux.org/AVG-2846","reference_id":"AVG-2846","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2846"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38546","reference_id":"CVE-2023-38546","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38546"},{"reference_url":"https://curl.se/docs/CVE-2023-38546.html","reference_id":"CVE-2023-38546.HTML","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"https://curl.se/docs/CVE-2023-38546.html"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://support.apple.com/kb/HT214036","reference_id":"HT214036","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"https://support.apple.com/kb/HT214036"},{"reference_url":"https://support.apple.com/kb/HT214057","reference_id":"HT214057","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"https://support.apple.com/kb/HT214057"},{"reference_url":"https://support.apple.com/kb/HT214058","reference_id":"HT214058","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"https://support.apple.com/kb/HT214058"},{"reference_url":"https://support.apple.com/kb/HT214063","reference_id":"HT214063","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"https://support.apple.com/kb/HT214063"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/","reference_id":"OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5700","reference_id":"RHSA-2023:5700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5763","reference_id":"RHSA-2023:5763","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5763"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6292","reference_id":"RHSA-2023:6292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6745","reference_id":"RHSA-2023:6745","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7540","reference_id":"RHSA-2023:7540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7625","reference_id":"RHSA-2023:7625","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7625"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7626","reference_id":"RHSA-2023:7626","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7626"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1601","reference_id":"RHSA-2024:1601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2092","reference_id":"RHSA-2024:2092","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2092"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2093","reference_id":"RHSA-2024:2093","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2093"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2101","reference_id":"RHSA-2024:2101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2101"},{"reference_url":"https://usn.ubuntu.com/6429-1/","reference_id":"USN-6429-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6429-1/"},{"reference_url":"https://usn.ubuntu.com/6429-2/","reference_id":"USN-6429-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6429-2/"},{"reference_url":"https://usn.ubuntu.com/6429-3/","reference_id":"USN-6429-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6429-3/"},{"reference_url":"https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868","reference_id":"viewtopic.php?f=8&t=8868","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586457?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/586458?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/586459?format=json","purl":"pkg:deb/debian/curl@8.3.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.3.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2023-38546"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gnx2-djyk-uyaf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49276?format=json","vulnerability_id":"VCID-gv7x-j8bz-wycc","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32207.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32207.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32207","reference_id":"","reference_type":"","scores":[{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42429","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42604","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42633","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42572","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42624","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42635","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42658","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42622","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42594","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42654","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42639","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42574","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42512","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42513","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32207"},{"reference_url":"https://curl.se/docs/CVE-2022-32207.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-32207.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1573634","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/"}],"url":"https://hackerone.com/reports/1573634"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2099305","reference_id":"2099305","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2099305"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Oct/28","reference_id":"28","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Oct/28"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Oct/41","reference_id":"41","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Oct/41"},{"reference_url":"https://security.archlinux.org/AVG-2817","reference_id":"AVG-2817","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2817"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/","reference_id":"BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/"},{"reference_url":"https://www.debian.org/security/2022/dsa-5197","reference_id":"dsa-5197","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/"}],"url":"https://www.debian.org/security/2022/dsa-5197"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://support.apple.com/kb/HT213488","reference_id":"HT213488","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/"}],"url":"https://support.apple.com/kb/HT213488"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220915-0003/","reference_id":"ntap-20220915-0003","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:36Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220915-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6157","reference_id":"RHSA-2022:6157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8840","reference_id":"RHSA-2022:8840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8841","reference_id":"RHSA-2022:8841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8841"},{"reference_url":"https://usn.ubuntu.com/5495-1/","reference_id":"USN-5495-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5495-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582658?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583413?format=json","purl":"pkg:deb/debian/curl@7.84.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.84.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2022-32207"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gv7x-j8bz-wycc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41493?format=json","vulnerability_id":"VCID-gwb6-rf4r-d3b2","summary":"Multiple vulnerabilities have been found in cURL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"http://blog.volema.com/curl-rce.html","reference_id":"","reference_type":"","scores":[],"url":"http://blog.volema.com/curl-rce.html"},{"reference_url":"http://curl.haxx.se/docs/adv_20130206.html","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/docs/adv_20130206.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099140.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099140.html"},{"reference_url":"http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/","reference_id":"","reference_type":"","scores":[],"url":"http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/"},{"reference_url":"http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html"},{"reference_url":"http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0249.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0249.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-0249","reference_id":"","reference_type":"","scores":[{"value":"0.44202","scoring_system":"epss","scoring_elements":"0.97562","published_at":"2026-04-29T12:55:00Z"},{"value":"0.44202","scoring_system":"epss","scoring_elements":"0.97558","published_at":"2026-04-24T12:55:00Z"},{"value":"0.44202","scoring_system":"epss","scoring_elements":"0.97526","published_at":"2026-04-01T12:55:00Z"},{"value":"0.44202","scoring_system":"epss","scoring_elements":"0.97531","published_at":"2026-04-02T12:55:00Z"},{"value":"0.44202","scoring_system":"epss","scoring_elements":"0.97534","published_at":"2026-04-04T12:55:00Z"},{"value":"0.44202","scoring_system":"epss","scoring_elements":"0.97536","published_at":"2026-04-07T12:55:00Z"},{"value":"0.44202","scoring_system":"epss","scoring_elements":"0.97541","published_at":"2026-04-08T12:55:00Z"},{"value":"0.44202","scoring_system":"epss","scoring_elements":"0.97543","published_at":"2026-04-09T12:55:00Z"},{"value":"0.44202","scoring_system":"epss","scoring_elements":"0.97546","published_at":"2026-04-11T12:55:00Z"},{"value":"0.44202","scoring_system":"epss","scoring_elements":"0.97549","published_at":"2026-04-13T12:55:00Z"},{"value":"0.44202","scoring_system":"epss","scoring_elements":"0.97557","published_at":"2026-04-16T12:55:00Z"},{"value":"0.44202","scoring_system":"epss","scoring_elements":"0.97559","published_at":"2026-04-26T12:55:00Z"},{"value":"0.44202","scoring_system":"epss","scoring_elements":"0.97561","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-0249"},{"reference_url":"https://curl.se/docs/CVE-2013-0249.html","reference_id":"","reference_type":"","scores":[{"value":"Critical","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2013-0249.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0249","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0249"},{"reference_url":"http://www.exploit-db.com/exploits/24487","reference_id":"","reference_type":"","scores":[],"url":"http://www.exploit-db.com/exploits/24487"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.osvdb.org/89988","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/89988"},{"reference_url":"http://www.securityfocus.com/bid/57842","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/57842"},{"reference_url":"http://www.securitytracker.com/id/1028093","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1028093"},{"reference_url":"http://www.ubuntu.com/usn/USN-1721-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1721-1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700002","reference_id":"700002","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700002"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=906779","reference_id":"906779","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=906779"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-0249","reference_id":"CVE-2013-0249","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-0249"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/24487.py","reference_id":"CVE-2013-0249;OSVDB-89988","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/24487.py"},{"reference_url":"https://security.gentoo.org/glsa/201401-14","reference_id":"GLSA-201401-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-14"},{"reference_url":"https://usn.ubuntu.com/1721-1/","reference_id":"USN-1721-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1721-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586609?format=json","purl":"pkg:deb/debian/curl@7.29.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.29.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-0249"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gwb6-rf4r-d3b2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/354620?format=json","vulnerability_id":"VCID-hayq-ra35-myf3","summary":"","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-6276.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-6276.json"},{"reference_url":"https://curl.se/docs/CVE-2026-6276.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2026-6276.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6276","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6276"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/3671818","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/3671818"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2461203","reference_id":"2461203","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2461203"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:12916","reference_id":"RHSA-2026:12916","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:12916"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2026-6276"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hayq-ra35-myf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/164221?format=json","vulnerability_id":"VCID-hj8v-tgnn-mfdw","summary":"The verify_certificate function in lib/vtls/schannel.c in libcurl 7.30.0 through 7.51.0, when built for Windows CE using the schannel TLS backend, allows remote attackers to obtain sensitive information, cause a denial of service (crash), or possibly have unspecified other impact via a wildcard certificate name, which triggers an out-of-bounds read.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9953","reference_id":"","reference_type":"","scores":[{"value":"0.01854","scoring_system":"epss","scoring_elements":"0.83089","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01854","scoring_system":"epss","scoring_elements":"0.82946","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01854","scoring_system":"epss","scoring_elements":"0.82963","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01854","scoring_system":"epss","scoring_elements":"0.82976","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01854","scoring_system":"epss","scoring_elements":"0.82973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01854","scoring_system":"epss","scoring_elements":"0.82998","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01854","scoring_system":"epss","scoring_elements":"0.83005","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01854","scoring_system":"epss","scoring_elements":"0.83021","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01854","scoring_system":"epss","scoring_elements":"0.83015","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01854","scoring_system":"epss","scoring_elements":"0.8301","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01854","scoring_system":"epss","scoring_elements":"0.83049","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01854","scoring_system":"epss","scoring_elements":"0.83048","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01854","scoring_system":"epss","scoring_elements":"0.83051","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01854","scoring_system":"epss","scoring_elements":"0.83074","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01854","scoring_system":"epss","scoring_elements":"0.83082","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9953"},{"reference_url":"https://curl.se/docs/CVE-2016-9953.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-9953.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-9953"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hj8v-tgnn-mfdw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79435?format=json","vulnerability_id":"VCID-hjkx-6yep-mkde","summary":"curl: removes wrong file on error","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27778.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27778.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27778","reference_id":"","reference_type":"","scores":[{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75903","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75845","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75883","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75892","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75764","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75796","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75776","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75808","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.7582","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75825","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75818","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75856","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00911","scoring_system":"epss","scoring_elements":"0.75859","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27778"},{"reference_url":"https://curl.se/docs/CVE-2022-27778.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-27778.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1553598","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/1553598"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082194","reference_id":"2082194","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082194"},{"reference_url":"https://security.archlinux.org/AVG-2706","reference_id":"AVG-2706","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2706"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582920?format=json","purl":"pkg:deb/debian/curl@7.83.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2022-27778"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hjkx-6yep-mkde"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73974?format=json","vulnerability_id":"VCID-hrsy-694u-2fec","summary":"curl: OCSP stapling bypass with GnuTLS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8096.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8096.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8096","reference_id":"","reference_type":"","scores":[{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66669","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.6662","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66638","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66626","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66593","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66629","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66644","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.6663","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66655","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66562","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66587","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66559","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66606","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8096"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2310519","reference_id":"2310519","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2310519"},{"reference_url":"https://hackerone.com/reports/2669852","reference_id":"2669852","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T13:42:47Z/"}],"url":"https://hackerone.com/reports/2669852"},{"reference_url":"https://curl.se/docs/CVE-2024-8096.html","reference_id":"CVE-2024-8096.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T13:42:47Z/"}],"url":"https://curl.se/docs/CVE-2024-8096.html"},{"reference_url":"https://curl.se/docs/CVE-2024-8096.json","reference_id":"CVE-2024-8096.json","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T13:42:47Z/"}],"url":"https://curl.se/docs/CVE-2024-8096.json"},{"reference_url":"https://usn.ubuntu.com/7012-1/","reference_id":"USN-7012-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7012-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/585843?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u14?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/585844?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/585845?format=json","purl":"pkg:deb/debian/curl@8.10.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.10.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2024-8096"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hrsy-694u-2fec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49261?format=json","vulnerability_id":"VCID-hudt-78dw-tkf2","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22925","reference_id":"","reference_type":"","scores":[{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.55005","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.5489","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.55017","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.5496","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54986","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54956","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.55006","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62217","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62173","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62194","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62228","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62207","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62224","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62235","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62218","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22925"},{"reference_url":"https://curl.se/docs/CVE-2021-22925.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2021-22925.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1223882","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"}],"url":"https://hackerone.com/reports/1223882"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1970902","reference_id":"1970902","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1970902"},{"reference_url":"http://seclists.org/fulldisclosure/2021/Sep/39","reference_id":"39","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"}],"url":"http://seclists.org/fulldisclosure/2021/Sep/39"},{"reference_url":"http://seclists.org/fulldisclosure/2021/Sep/40","reference_id":"40","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"}],"url":"http://seclists.org/fulldisclosure/2021/Sep/40"},{"reference_url":"https://security.archlinux.org/ASA-202107-59","reference_id":"ASA-202107-59","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-59"},{"reference_url":"https://security.archlinux.org/ASA-202107-60","reference_id":"ASA-202107-60","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-60"},{"reference_url":"https://security.archlinux.org/ASA-202107-61","reference_id":"ASA-202107-61","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-61"},{"reference_url":"https://security.archlinux.org/ASA-202107-62","reference_id":"ASA-202107-62","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-62"},{"reference_url":"https://security.archlinux.org/ASA-202107-63","reference_id":"ASA-202107-63","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-63"},{"reference_url":"https://security.archlinux.org/ASA-202107-64","reference_id":"ASA-202107-64","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-64"},{"reference_url":"https://security.archlinux.org/AVG-2194","reference_id":"AVG-2194","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2194"},{"reference_url":"https://security.archlinux.org/AVG-2195","reference_id":"AVG-2195","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2195"},{"reference_url":"https://security.archlinux.org/AVG-2196","reference_id":"AVG-2196","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2196"},{"reference_url":"https://security.archlinux.org/AVG-2197","reference_id":"AVG-2197","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2197"},{"reference_url":"https://security.archlinux.org/AVG-2198","reference_id":"AVG-2198","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2198"},{"reference_url":"https://security.archlinux.org/AVG-2199","reference_id":"AVG-2199","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2199"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/","reference_id":"FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://support.apple.com/kb/HT212804","reference_id":"HT212804","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"}],"url":"https://support.apple.com/kb/HT212804"},{"reference_url":"https://support.apple.com/kb/HT212805","reference_id":"HT212805","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"}],"url":"https://support.apple.com/kb/HT212805"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210902-0003/","reference_id":"ntap-20210902-0003","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210902-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4511","reference_id":"RHSA-2021:4511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4511"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf","reference_id":"ssa-484086.pdf","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"}],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf"},{"reference_url":"https://usn.ubuntu.com/5021-1/","reference_id":"USN-5021-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5021-1/"},{"reference_url":"https://usn.ubuntu.com/5021-2/","reference_id":"USN-5021-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5021-2/"},{"reference_url":"https://usn.ubuntu.com/5894-1/","reference_id":"USN-5894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5894-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2021-22925"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hudt-78dw-tkf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34708?format=json","vulnerability_id":"VCID-hyqp-z8hb-fqbt","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9594.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9594.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9594","reference_id":"","reference_type":"","scores":[{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77857","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.78","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77864","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77892","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77874","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77901","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77906","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77933","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77917","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77916","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77954","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77953","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77946","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.7798","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77987","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9594"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9594","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:12Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9594"},{"reference_url":"https://curl.haxx.se/docs/adv_20161223.html","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:12Z/"}],"url":"https://curl.haxx.se/docs/adv_20161223.html"},{"reference_url":"https://curl.se/docs/CVE-2016-9594.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-9594.html"},{"reference_url":"https://www.tenable.com/security/tns-2017-04","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:12Z/"}],"url":"https://www.tenable.com/security/tns-2017-04"},{"reference_url":"http://www.securityfocus.com/bid/95094","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:12Z/"}],"url":"http://www.securityfocus.com/bid/95094"},{"reference_url":"http://www.securitytracker.com/id/1037528","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:12Z/"}],"url":"http://www.securitytracker.com/id/1037528"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1408385","reference_id":"1408385","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1408385"},{"reference_url":"https://security.archlinux.org/ASA-201612-22","reference_id":"ASA-201612-22","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201612-22"},{"reference_url":"https://security.archlinux.org/ASA-201701-10","reference_id":"ASA-201701-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-10"},{"reference_url":"https://security.archlinux.org/ASA-201701-11","reference_id":"ASA-201701-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-11"},{"reference_url":"https://security.archlinux.org/ASA-201701-7","reference_id":"ASA-201701-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-7"},{"reference_url":"https://security.archlinux.org/ASA-201701-8","reference_id":"ASA-201701-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-8"},{"reference_url":"https://security.archlinux.org/ASA-201701-9","reference_id":"ASA-201701-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-9"},{"reference_url":"https://security.archlinux.org/AVG-112","reference_id":"AVG-112","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-112"},{"reference_url":"https://security.archlinux.org/AVG-113","reference_id":"AVG-113","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-113"},{"reference_url":"https://security.archlinux.org/AVG-114","reference_id":"AVG-114","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-114"},{"reference_url":"https://security.archlinux.org/AVG-115","reference_id":"AVG-115","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-115"},{"reference_url":"https://security.archlinux.org/AVG-116","reference_id":"AVG-116","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-116"},{"reference_url":"https://security.archlinux.org/AVG-117","reference_id":"AVG-117","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-117"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-9594","reference_id":"CVE-2016-9594","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-9594"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:12Z/"}],"url":"https://security.gentoo.org/glsa/201701-47"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-9594"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hyqp-z8hb-fqbt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34701?format=json","vulnerability_id":"VCID-j2cq-q3r9-jfcp","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8620.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8620.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8620","reference_id":"","reference_type":"","scores":[{"value":"0.00816","scoring_system":"epss","scoring_elements":"0.74284","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00816","scoring_system":"epss","scoring_elements":"0.7429","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00816","scoring_system":"epss","scoring_elements":"0.74305","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00816","scoring_system":"epss","scoring_elements":"0.74326","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00816","scoring_system":"epss","scoring_elements":"0.74306","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00816","scoring_system":"epss","scoring_elements":"0.74298","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00816","scoring_system":"epss","scoring_elements":"0.74335","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00816","scoring_system":"epss","scoring_elements":"0.74378","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00816","scoring_system":"epss","scoring_elements":"0.74253","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00816","scoring_system":"epss","scoring_elements":"0.74258","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00816","scoring_system":"epss","scoring_elements":"0.74344","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00816","scoring_system":"epss","scoring_elements":"0.74337","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00816","scoring_system":"epss","scoring_elements":"0.7437","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00816","scoring_system":"epss","scoring_elements":"0.74379","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8620"},{"reference_url":"https://curl.se/docs/CVE-2016-8620.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8620.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037192","reference_id":"1037192","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:04:13Z/"}],"url":"http://www.securitytracker.com/id/1037192"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388382","reference_id":"1388382","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388382"},{"reference_url":"http://www.securityfocus.com/bid/94102","reference_id":"94102","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:04:13Z/"}],"url":"http://www.securityfocus.com/bid/94102"},{"reference_url":"https://curl.haxx.se/docs/adv_20161102F.html","reference_id":"adv_20161102F.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:04:13Z/"}],"url":"https://curl.haxx.se/docs/adv_20161102F.html"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:04:13Z/"}],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8620","reference_id":"show_bug.cgi?id=CVE-2016-8620","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:04:13Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8620"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583608?format=json","purl":"pkg:deb/debian/curl@7.51.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-8620"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j2cq-q3r9-jfcp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59714?format=json","vulnerability_id":"VCID-j2qx-np45-4qdu","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2486","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:02:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:2486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3558","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:02:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:3558"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000257.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000257.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000257","reference_id":"","reference_type":"","scores":[{"value":"0.00875","scoring_system":"epss","scoring_elements":"0.75334","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00875","scoring_system":"epss","scoring_elements":"0.75325","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00875","scoring_system":"epss","scoring_elements":"0.75327","published_at":"2026-04-16T12:55:00Z"},{"value":"0.009","scoring_system":"epss","scoring_elements":"0.75728","published_at":"2026-04-24T12:55:00Z"},{"value":"0.009","scoring_system":"epss","scoring_elements":"0.75744","published_at":"2026-04-29T12:55:00Z"},{"value":"0.009","scoring_system":"epss","scoring_elements":"0.75733","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.76991","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.76996","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77017","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0109","scoring_system":"epss","scoring_elements":"0.77876","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80574","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80531","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80553","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80545","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01419","scoring_system":"epss","scoring_elements":"0.80584","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000257"},{"reference_url":"https://curl.haxx.se/docs/adv_20171023.html","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:02:33Z/"}],"url":"https://curl.haxx.se/docs/adv_20171023.html"},{"reference_url":"https://curl.se/docs/CVE-2017-1000257.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2017-1000257.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000257","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000257"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:P/A:P"},{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2017/dsa-4007","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:02:33Z/"}],"url":"http://www.debian.org/security/2017/dsa-4007"},{"reference_url":"http://www.securityfocus.com/bid/101519","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:02:33Z/"}],"url":"http://www.securityfocus.com/bid/101519"},{"reference_url":"http://www.securitytracker.com/id/1039644","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:02:33Z/"}],"url":"http://www.securitytracker.com/id/1039644"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1503705","reference_id":"1503705","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1503705"},{"reference_url":"https://security.archlinux.org/ASA-201711-10","reference_id":"ASA-201711-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-10"},{"reference_url":"https://security.archlinux.org/ASA-201711-11","reference_id":"ASA-201711-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-11"},{"reference_url":"https://security.archlinux.org/ASA-201711-6","reference_id":"ASA-201711-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-6"},{"reference_url":"https://security.archlinux.org/ASA-201711-7","reference_id":"ASA-201711-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-7"},{"reference_url":"https://security.archlinux.org/ASA-201711-8","reference_id":"ASA-201711-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-8"},{"reference_url":"https://security.archlinux.org/ASA-201711-9","reference_id":"ASA-201711-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-9"},{"reference_url":"https://security.archlinux.org/AVG-462","reference_id":"AVG-462","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-462"},{"reference_url":"https://security.archlinux.org/AVG-463","reference_id":"AVG-463","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-463"},{"reference_url":"https://security.archlinux.org/AVG-464","reference_id":"AVG-464","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-464"},{"reference_url":"https://security.archlinux.org/AVG-465","reference_id":"AVG-465","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-465"},{"reference_url":"https://security.archlinux.org/AVG-466","reference_id":"AVG-466","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-466"},{"reference_url":"https://security.archlinux.org/AVG-467","reference_id":"AVG-467","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-467"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000257","reference_id":"CVE-2017-1000257","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:P"},{"value":"9.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000257"},{"reference_url":"https://security.gentoo.org/glsa/201712-04","reference_id":"GLSA-201712-04","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:02:33Z/"}],"url":"https://security.gentoo.org/glsa/201712-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3263","reference_id":"RHSA-2017:3263","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:02:33Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:3263"},{"reference_url":"https://usn.ubuntu.com/3441-2/","reference_id":"USN-3441-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3441-2/"},{"reference_url":"https://usn.ubuntu.com/3457-1/","reference_id":"USN-3457-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3457-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582668?format=json","purl":"pkg:deb/debian/curl@7.56.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.56.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2017-1000257"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j2qx-np45-4qdu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46197?format=json","vulnerability_id":"VCID-j5s3-rr74-nqb8","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in information disclosure or data loss.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8169.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8169.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8169","reference_id":"","reference_type":"","scores":[{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15732","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15619","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15636","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15682","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15678","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1576","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15827","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1563","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15715","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15774","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15743","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15708","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15643","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15576","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15586","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8169"},{"reference_url":"https://curl.se/docs/CVE-2020-8169.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2020-8169.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/874778","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/874778"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1847916","reference_id":"1847916","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1847916"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965280","reference_id":"965280","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965280"},{"reference_url":"https://security.archlinux.org/AVG-1194","reference_id":"AVG-1194","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1194"},{"reference_url":"https://security.gentoo.org/glsa/202007-16","reference_id":"GLSA-202007-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202007-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2471","reference_id":"RHSA-2021:2471","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2471"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2472","reference_id":"RHSA-2021:2472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2472"},{"reference_url":"https://usn.ubuntu.com/4402-1/","reference_id":"USN-4402-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4402-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583866?format=json","purl":"pkg:deb/debian/curl@7.72.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.72.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2020-8169"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j5s3-rr74-nqb8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34692?format=json","vulnerability_id":"VCID-jeqg-g3en-5udw","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5420.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5420.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5420","reference_id":"","reference_type":"","scores":[{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77847","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77991","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.7797","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77977","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77854","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77882","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77864","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77891","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77896","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77923","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77907","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77906","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77944","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77943","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77937","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5420"},{"reference_url":"https://curl.se/docs/CVE-2016-5420.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-5420.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1362190","reference_id":"1362190","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1362190"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2575","reference_id":"RHSA-2016:2575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2957","reference_id":"RHSA-2016:2957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2957"},{"reference_url":"https://usn.ubuntu.com/3048-1/","reference_id":"USN-3048-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3048-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584626?format=json","purl":"pkg:deb/debian/curl@7.50.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.50.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-5420"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jeqg-g3en-5udw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49699?format=json","vulnerability_id":"VCID-jnfc-8f5d-pyh4","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000005.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000005.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000005","reference_id":"","reference_type":"","scores":[{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55445","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55523","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.5562","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55599","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55582","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55623","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55602","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.5553","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55548","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55555","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.5558","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55609","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55611","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000005"},{"reference_url":"https://curl.se/docs/CVE-2018-1000005.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2018-1000005.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000005"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1536013","reference_id":"1536013","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1536013"},{"reference_url":"https://security.archlinux.org/ASA-201801-20","reference_id":"ASA-201801-20","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-20"},{"reference_url":"https://security.archlinux.org/ASA-201801-22","reference_id":"ASA-201801-22","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-22"},{"reference_url":"https://security.archlinux.org/ASA-201801-23","reference_id":"ASA-201801-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-23"},{"reference_url":"https://security.archlinux.org/ASA-201801-24","reference_id":"ASA-201801-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-24"},{"reference_url":"https://security.archlinux.org/ASA-201801-25","reference_id":"ASA-201801-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-25"},{"reference_url":"https://security.archlinux.org/ASA-201801-26","reference_id":"ASA-201801-26","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-26"},{"reference_url":"https://security.archlinux.org/AVG-593","reference_id":"AVG-593","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-593"},{"reference_url":"https://security.archlinux.org/AVG-594","reference_id":"AVG-594","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-594"},{"reference_url":"https://security.archlinux.org/AVG-595","reference_id":"AVG-595","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-595"},{"reference_url":"https://security.archlinux.org/AVG-596","reference_id":"AVG-596","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-596"},{"reference_url":"https://security.archlinux.org/AVG-597","reference_id":"AVG-597","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-597"},{"reference_url":"https://security.archlinux.org/AVG-598","reference_id":"AVG-598","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-598"},{"reference_url":"https://security.gentoo.org/glsa/201804-04","reference_id":"GLSA-201804-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-04"},{"reference_url":"https://usn.ubuntu.com/3554-1/","reference_id":"USN-3554-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3554-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585653?format=json","purl":"pkg:deb/debian/curl@7.58.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.58.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2018-1000005"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jnfc-8f5d-pyh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34702?format=json","vulnerability_id":"VCID-jqqf-gmd3-ubcd","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8621.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8621.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8621","reference_id":"","reference_type":"","scores":[{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84627","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84539","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84639","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84622","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84638","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84617","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84555","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84576","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.8458","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84601","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84608","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02369","scoring_system":"epss","scoring_elements":"0.84974","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03233","scoring_system":"epss","scoring_elements":"0.87113","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03233","scoring_system":"epss","scoring_elements":"0.87106","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03233","scoring_system":"epss","scoring_elements":"0.87112","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8621"},{"reference_url":"https://curl.se/docs/CVE-2016-8621.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8621.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037192","reference_id":"1037192","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/"}],"url":"http://www.securitytracker.com/id/1037192"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388385","reference_id":"1388385","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388385"},{"reference_url":"http://www.securityfocus.com/bid/94101","reference_id":"94101","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/"}],"url":"http://www.securityfocus.com/bid/94101"},{"reference_url":"https://curl.haxx.se/docs/adv_20161102G.html","reference_id":"adv_20161102G.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/"}],"url":"https://curl.haxx.se/docs/adv_20161102G.html"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://curl.haxx.se/CVE-2016-8621.patch","reference_id":"CVE-2016-8621.patch","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/"}],"url":"https://curl.haxx.se/CVE-2016-8621.patch"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/"}],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621","reference_id":"show_bug.cgi?id=CVE-2016-8621","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583608?format=json","purl":"pkg:deb/debian/curl@7.51.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-8621"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jqqf-gmd3-ubcd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34700?format=json","vulnerability_id":"VCID-jtw4-af4y-nkbk","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8619.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8619.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8619","reference_id":"","reference_type":"","scores":[{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86359","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86466","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86432","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.8643","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86425","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86441","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86446","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.8644","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86459","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86469","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.8637","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86387","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86389","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86408","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86418","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8619"},{"reference_url":"https://curl.se/docs/CVE-2016-8619.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8619.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388379","reference_id":"1388379","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388379"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583608?format=json","purl":"pkg:deb/debian/curl@7.51.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-8619"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jtw4-af4y-nkbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50088?format=json","vulnerability_id":"VCID-ju6h-a1sz-f7e5","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in information disclosure or data loss.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8285.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8285.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8285","reference_id":"","reference_type":"","scores":[{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73057","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.7306","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.7305","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73008","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72955","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72968","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72994","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72973","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72967","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.7291","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73011","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72922","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.73018","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72942","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00742","scoring_system":"epss","scoring_elements":"0.72917","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8285"},{"reference_url":"https://curl.se/docs/CVE-2020-8285.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"}],"url":"https://curl.se/docs/CVE-2020-8285.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1045844","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"}],"url":"https://hackerone.com/reports/1045844"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1902687","reference_id":"1902687","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1902687"},{"reference_url":"http://seclists.org/fulldisclosure/2021/Apr/51","reference_id":"51","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"}],"url":"http://seclists.org/fulldisclosure/2021/Apr/51"},{"reference_url":"https://github.com/curl/curl/issues/6255","reference_id":"6255","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"}],"url":"https://github.com/curl/curl/issues/6255"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977162","reference_id":"977162","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977162"},{"reference_url":"https://security.archlinux.org/AVG-1337","reference_id":"AVG-1337","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1337"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8285","reference_id":"CVE-2020-8285","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8285"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/","reference_id":"DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/"},{"reference_url":"https://www.debian.org/security/2021/dsa-4881","reference_id":"dsa-4881","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"}],"url":"https://www.debian.org/security/2021/dsa-4881"},{"reference_url":"https://security.gentoo.org/glsa/202012-14","reference_id":"GLSA-202012-14","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"}],"url":"https://security.gentoo.org/glsa/202012-14"},{"reference_url":"https://support.apple.com/kb/HT212325","reference_id":"HT212325","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"}],"url":"https://support.apple.com/kb/HT212325"},{"reference_url":"https://support.apple.com/kb/HT212326","reference_id":"HT212326","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"}],"url":"https://support.apple.com/kb/HT212326"},{"reference_url":"https://support.apple.com/kb/HT212327","reference_id":"HT212327","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"}],"url":"https://support.apple.com/kb/HT212327"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html","reference_id":"msg00029.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210122-0007/","reference_id":"ntap-20210122-0007","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210122-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/","reference_id":"NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T14:06:58Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1610","reference_id":"RHSA-2021:1610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2471","reference_id":"RHSA-2021:2471","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2471"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2472","reference_id":"RHSA-2021:2472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2472"},{"reference_url":"https://usn.ubuntu.com/4665-1/","reference_id":"USN-4665-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4665-1/"},{"reference_url":"https://usn.ubuntu.com/4665-2/","reference_id":"USN-4665-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4665-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586313?format=json","purl":"pkg:deb/debian/curl@7.74.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2020-8285"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ju6h-a1sz-f7e5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34695?format=json","vulnerability_id":"VCID-k8kj-q1je-f7bt","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7167.json","reference_id":"","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7167.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7167","reference_id":"","reference_type":"","scores":[{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84631","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84765","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84727","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84729","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84756","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84766","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84646","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84666","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84667","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84689","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84696","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84715","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.8471","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84704","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84726","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7167"},{"reference_url":"https://curl.se/docs/CVE-2016-7167.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-7167.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375906","reference_id":"1375906","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375906"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837945","reference_id":"837945","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837945"},{"reference_url":"https://security.archlinux.org/ASA-201609-18","reference_id":"ASA-201609-18","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-18"},{"reference_url":"https://security.archlinux.org/ASA-201609-19","reference_id":"ASA-201609-19","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-19"},{"reference_url":"https://security.archlinux.org/AVG-20","reference_id":"AVG-20","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-20"},{"reference_url":"https://security.archlinux.org/AVG-21","reference_id":"AVG-21","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-21"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2016","reference_id":"RHSA-2017:2016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2016"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583608?format=json","purl":"pkg:deb/debian/curl@7.51.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-7167"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k8kj-q1je-f7bt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/16991?format=json","vulnerability_id":"VCID-ke81-x2ze-rbc5","summary":"Double Free\nA double free vulnerability exists in libcurl <8.0.0 when sharing HSTS data between separate \"handles\". This sharing was introduced without considerations for do this sharing across separate threads but there was no indication of this fact in the documentation. Due to missing mutexes or thread locks, two threads sharing the same HSTS data could end up doing a double-free or use-after-free.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27537.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27537.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27537","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14506","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14539","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14609","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14418","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14504","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14558","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1908","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21544","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21741","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21707","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2156","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21554","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24345","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24288","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27537"},{"reference_url":"https://curl.se/docs/CVE-2023-27537.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-27537.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1897203","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/1897203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179097","reference_id":"2179097","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179097"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27537","reference_id":"CVE-2023-27537","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27537"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202310-12"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584289?format=json","purl":"pkg:deb/debian/curl@7.88.1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2023-27537"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ke81-x2ze-rbc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49307?format=json","vulnerability_id":"VCID-krgt-drpz-y7cy","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000300.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000300.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000300","reference_id":"","reference_type":"","scores":[{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75468","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75605","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75533","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75553","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75531","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75522","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75565","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75571","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75558","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75596","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.756","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.7547","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75501","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75482","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0089","scoring_system":"epss","scoring_elements":"0.75524","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000300"},{"reference_url":"https://curl.haxx.se/docs/adv_2018-82c2.html","reference_id":"","reference_type":"","scores":[],"url":"https://curl.haxx.se/docs/adv_2018-82c2.html"},{"reference_url":"https://curl.se/docs/CVE-2018-1000300.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2018-1000300.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000300","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000300"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"reference_url":"http://www.securityfocus.com/bid/104207","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104207"},{"reference_url":"http://www.securitytracker.com/id/1040933","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040933"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1575533","reference_id":"1575533","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1575533"},{"reference_url":"https://security.archlinux.org/ASA-201805-13","reference_id":"ASA-201805-13","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201805-13"},{"reference_url":"https://security.archlinux.org/ASA-201805-14","reference_id":"ASA-201805-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201805-14"},{"reference_url":"https://security.archlinux.org/ASA-201805-15","reference_id":"ASA-201805-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201805-15"},{"reference_url":"https://security.archlinux.org/ASA-201805-16","reference_id":"ASA-201805-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201805-16"},{"reference_url":"https://security.archlinux.org/ASA-201805-17","reference_id":"ASA-201805-17","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201805-17"},{"reference_url":"https://security.archlinux.org/ASA-201805-18","reference_id":"ASA-201805-18","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201805-18"},{"reference_url":"https://security.archlinux.org/AVG-694","reference_id":"AVG-694","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-694"},{"reference_url":"https://security.archlinux.org/AVG-695","reference_id":"AVG-695","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-695"},{"reference_url":"https://security.archlinux.org/AVG-696","reference_id":"AVG-696","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-696"},{"reference_url":"https://security.archlinux.org/AVG-697","reference_id":"AVG-697","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-697"},{"reference_url":"https://security.archlinux.org/AVG-698","reference_id":"AVG-698","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-698"},{"reference_url":"https://security.archlinux.org/AVG-699","reference_id":"AVG-699","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-699"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000300","reference_id":"CVE-2018-1000300","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000300"},{"reference_url":"https://security.gentoo.org/glsa/201806-05","reference_id":"GLSA-201806-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201806-05"},{"reference_url":"https://usn.ubuntu.com/3648-1/","reference_id":"USN-3648-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3648-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582786?format=json","purl":"pkg:deb/debian/curl@7.60.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.60.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2018-1000300"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-krgt-drpz-y7cy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68002?format=json","vulnerability_id":"VCID-ksap-zrmb-ebcu","summary":"curl: predictable WebSocket mask","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10148.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10148.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-10148","reference_id":"","reference_type":"","scores":[{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28205","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28161","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29442","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29742","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29698","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29618","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29504","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30659","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30683","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30714","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30746","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30749","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30704","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-10148"},{"reference_url":"https://curl.se/docs/CVE-2025-10148.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-12T17:16:46Z/"}],"url":"https://curl.se/docs/CVE-2025-10148.html"},{"reference_url":"https://hackerone.com/reports/3330839","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-12T17:16:46Z/"}],"url":"https://hackerone.com/reports/3330839"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2394749","reference_id":"2394749","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2394749"},{"reference_url":"https://curl.se/docs/CVE-2025-10148.json","reference_id":"CVE-2025-10148.json","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-12T17:16:46Z/"}],"url":"https://curl.se/docs/CVE-2025-10148.json"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6893","reference_id":"RHSA-2026:6893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6893"},{"reference_url":"https://usn.ubuntu.com/8062-1/","reference_id":"USN-8062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8062-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/586210?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921941?format=json","purl":"pkg:deb/debian/curl@8.16.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.16.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2025-10148"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ksap-zrmb-ebcu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/97811?format=json","vulnerability_id":"VCID-kt4b-7ffh-4bch","summary":"When using `CURLOPT_PINNEDPUBLICKEY` option with libcurl or `--pinnedpubkey`\nwith the curl tool,curl should check the public key of the server certificate\nto verify the peer.\n\nThis check was skipped in a certain condition that would then make curl allow\nthe connection without performing the proper check, thus not noticing a\npossible impostor. To skip this check, the connection had to be done with QUIC\nwith ngtcp2 built to use GnuTLS and the user had to explicitly disable the\nstandard certificate verification.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13034.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13034.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13034","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01204","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.0129","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01209","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.012","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01212","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01284","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01294","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01211","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.0122","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01226","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.0123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01213","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01207","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13034"},{"reference_url":"https://curl.se/docs/CVE-2025-13034.html","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:56:11Z/"}],"url":"https://curl.se/docs/CVE-2025-13034.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426406","reference_id":"2426406","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426406"},{"reference_url":"https://curl.se/docs/CVE-2025-13034.json","reference_id":"CVE-2025-13034.json","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:56:11Z/"}],"url":"https://curl.se/docs/CVE-2025-13034.json"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6893","reference_id":"RHSA-2026:6893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6893"},{"reference_url":"https://usn.ubuntu.com/8062-1/","reference_id":"USN-8062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8062-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921943?format=json","purl":"pkg:deb/debian/curl@8.18.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.18.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2025-13034"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kt4b-7ffh-4bch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57266?format=json","vulnerability_id":"VCID-m15r-v9sr-2bbn","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28319.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28319.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28319","reference_id":"","reference_type":"","scores":[{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55044","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55072","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55097","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55073","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55122","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55134","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55114","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55138","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55117","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55052","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28319"},{"reference_url":"https://curl.se/docs/CVE-2023-28319.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-28319.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1913733","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/"}],"url":"https://hackerone.com/reports/1913733"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239","reference_id":"1036239","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196778","reference_id":"2196778","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196778"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/47","reference_id":"47","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/47"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/48","reference_id":"48","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/48"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/52","reference_id":"52","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/52"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://support.apple.com/kb/HT213843","reference_id":"HT213843","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/"}],"url":"https://support.apple.com/kb/HT213843"},{"reference_url":"https://support.apple.com/kb/HT213844","reference_id":"HT213844","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/"}],"url":"https://support.apple.com/kb/HT213844"},{"reference_url":"https://support.apple.com/kb/HT213845","reference_id":"HT213845","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/"}],"url":"https://support.apple.com/kb/HT213845"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230609-0009/","reference_id":"ntap-20230609-0009","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:59:44Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230609-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4628","reference_id":"RHSA-2023:4628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4629","reference_id":"RHSA-2023:4629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4629"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583792?format=json","purl":"pkg:deb/debian/curl@7.88.1-10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2023-28319"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m15r-v9sr-2bbn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/134641?format=json","vulnerability_id":"VCID-m3nh-aha9-dfbc","summary":"Absolute path traversal vulnerability in curl 7.20.0 through 7.21.1, when the --remote-header-name or -J option is used, allows remote servers to create or overwrite arbitrary files by using \\ (backslash) as a separator of path components within the Content-disposition HTTP header.","references":[{"reference_url":"http://curl.haxx.se/docs/adv_20101013.html","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/docs/adv_20101013.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3842","reference_id":"","reference_type":"","scores":[{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75731","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.7572","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.7559","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75592","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75623","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75603","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75638","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75649","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75673","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75655","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75686","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.7569","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75675","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75715","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3842"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=642642","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=642642"},{"reference_url":"https://curl.se/docs/CVE-2010-3842.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2010-3842.html"},{"reference_url":"http://secunia.com/advisories/39532","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/39532"},{"reference_url":"http://securitytracker.com/id?1024583","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024583"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/13/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/13/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/13/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/13/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/10/13/5","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/10/13/5"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.20.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.20.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.20.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.20.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.20.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.20.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.21.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.21.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.21.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3842","reference_id":"CVE-2010-3842","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3842"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2010-3842"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m3nh-aha9-dfbc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/161670?format=json","vulnerability_id":"VCID-m3r3-25yq-hqdc","summary":"Curl before 7.49.1 in Apple OS X before macOS Sierra prior to 10.12 allows remote or local attackers to execute arbitrary code, gain sensitive information, cause denial-of-service conditions, bypass security restrictions, and perform unauthorized actions. This may aid in other attacks.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4606","reference_id":"","reference_type":"","scores":[{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44368","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44439","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4446","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44395","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44446","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44453","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4447","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44438","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44437","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44494","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44484","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44415","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01628","scoring_system":"epss","scoring_elements":"0.81933","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01628","scoring_system":"epss","scoring_elements":"0.81943","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01628","scoring_system":"epss","scoring_elements":"0.81948","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4606"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-4606"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m3r3-25yq-hqdc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69458?format=json","vulnerability_id":"VCID-m5fs-um7r-9qh2","summary":"curl: libcurl: WebSocket endless loop","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5399.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5399.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5399","reference_id":"","reference_type":"","scores":[{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43448","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00486","scoring_system":"epss","scoring_elements":"0.65424","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00486","scoring_system":"epss","scoring_elements":"0.65389","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00486","scoring_system":"epss","scoring_elements":"0.65409","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00486","scoring_system":"epss","scoring_elements":"0.65396","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00486","scoring_system":"epss","scoring_elements":"0.65368","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00486","scoring_system":"epss","scoring_elements":"0.65404","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00486","scoring_system":"epss","scoring_elements":"0.65415","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00486","scoring_system":"epss","scoring_elements":"0.65399","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00486","scoring_system":"epss","scoring_elements":"0.65416","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00486","scoring_system":"epss","scoring_elements":"0.65427","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00486","scoring_system":"epss","scoring_elements":"0.65362","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00486","scoring_system":"epss","scoring_elements":"0.65326","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00486","scoring_system":"epss","scoring_elements":"0.65378","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5399"},{"reference_url":"https://curl.se/docs/CVE-2025-5399.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T13:20:18Z/"}],"url":"https://curl.se/docs/CVE-2025-5399.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/3168039","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T13:20:18Z/"}],"url":"https://hackerone.com/reports/3168039"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2370920","reference_id":"2370920","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2370920"},{"reference_url":"https://security.archlinux.org/ASA-202506-2","reference_id":"ASA-202506-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202506-2"},{"reference_url":"https://security.archlinux.org/AVG-2895","reference_id":"AVG-2895","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2895"},{"reference_url":"https://curl.se/docs/CVE-2025-5399.json","reference_id":"CVE-2025-5399.json","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T13:20:18Z/"}],"url":"https://curl.se/docs/CVE-2025-5399.json"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583707?format=json","purl":"pkg:deb/debian/curl@8.14.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2025-5399"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m5fs-um7r-9qh2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/147967?format=json","vulnerability_id":"VCID-ma8s-he6x-z7a8","summary":"curl and libcurl 7.27.0 through 7.35.0, when running on Windows and using the SChannel/Winssl TLS backend, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP address, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2522","reference_id":"","reference_type":"","scores":[{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52514","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52452","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52498","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52525","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52491","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52544","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52539","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.5259","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52574","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52559","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52599","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52605","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52591","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52541","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52551","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2522"},{"reference_url":"https://curl.se/docs/CVE-2014-2522.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2014-2522.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2014-2522"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ma8s-he6x-z7a8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65185?format=json","vulnerability_id":"VCID-mkyr-w79c-qqfz","summary":"curl: curl: Security bypass due to global TLS option changes in multi-threaded LDAPS transfers","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14017.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14017.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-14017","reference_id":"","reference_type":"","scores":[{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00623","published_at":"2026-04-26T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00582","published_at":"2026-04-12T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00583","published_at":"2026-04-13T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00579","published_at":"2026-04-16T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00584","published_at":"2026-04-18T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00624","published_at":"2026-04-29T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00621","published_at":"2026-04-24T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.006","published_at":"2026-04-02T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00593","published_at":"2026-04-08T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00595","published_at":"2026-04-07T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00587","published_at":"2026-04-09T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00586","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-14017"},{"reference_url":"https://curl.se/docs/CVE-2025-14017.html","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-16T15:39:09Z/"}],"url":"https://curl.se/docs/CVE-2025-14017.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14017"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2427870","reference_id":"2427870","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2427870"},{"reference_url":"https://curl.se/docs/CVE-2025-14017.json","reference_id":"CVE-2025-14017.json","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-16T15:39:09Z/"}],"url":"https://curl.se/docs/CVE-2025-14017.json"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6893","reference_id":"RHSA-2026:6893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6893"},{"reference_url":"https://usn.ubuntu.com/8062-1/","reference_id":"USN-8062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8062-1/"},{"reference_url":"https://usn.ubuntu.com/8062-2/","reference_id":"USN-8062-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8062-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/921943?format=json","purl":"pkg:deb/debian/curl@8.18.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.18.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2025-14017"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mkyr-w79c-qqfz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/16992?format=json","vulnerability_id":"VCID-ms2r-94ph-yyh3","summary":"Improper Authentication\nAn authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27536.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27536.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27536","reference_id":"","reference_type":"","scores":[{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01383","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.0129","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01301","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01306","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.0131","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01294","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01288","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01291","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01282","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01295","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01369","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01379","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01384","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00011","scoring_system":"epss","scoring_elements":"0.01285","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27536"},{"reference_url":"https://curl.se/docs/CVE-2023-27536.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-27536.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27536","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27536"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1895135","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T15:39:19Z/"}],"url":"https://hackerone.com/reports/1895135"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179092","reference_id":"2179092","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179092"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/","reference_id":"36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T15:39:19Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27536","reference_id":"CVE-2023-27536","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27536"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T15:39:19Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html","reference_id":"msg00025.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T15:39:19Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230420-0010/","reference_id":"ntap-20230420-0010","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-14T15:39:19Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230420-0010/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4523","reference_id":"RHSA-2023:4523","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4523"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6679","reference_id":"RHSA-2023:6679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0428","reference_id":"RHSA-2024:0428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0428"},{"reference_url":"https://usn.ubuntu.com/5964-1/","reference_id":"USN-5964-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5964-1/"},{"reference_url":"https://usn.ubuntu.com/5964-2/","reference_id":"USN-5964-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5964-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584288?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584289?format=json","purl":"pkg:deb/debian/curl@7.88.1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2023-27536"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ms2r-94ph-yyh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74682?format=json","vulnerability_id":"VCID-my7a-jeng-5bhw","summary":"curl: macidn punycode buffer overread","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6874.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6874.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-6874","reference_id":"","reference_type":"","scores":[{"value":"0.0099","scoring_system":"epss","scoring_elements":"0.76969","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0099","scoring_system":"epss","scoring_elements":"0.76866","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0099","scoring_system":"epss","scoring_elements":"0.76877","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0099","scoring_system":"epss","scoring_elements":"0.76905","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0099","scoring_system":"epss","scoring_elements":"0.76884","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0099","scoring_system":"epss","scoring_elements":"0.76879","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0099","scoring_system":"epss","scoring_elements":"0.7692","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0099","scoring_system":"epss","scoring_elements":"0.76925","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0099","scoring_system":"epss","scoring_elements":"0.76917","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0099","scoring_system":"epss","scoring_elements":"0.76949","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0099","scoring_system":"epss","scoring_elements":"0.76957","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0099","scoring_system":"epss","scoring_elements":"0.76826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0099","scoring_system":"epss","scoring_elements":"0.76855","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0099","scoring_system":"epss","scoring_elements":"0.76835","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-6874"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076996","reference_id":"1076996","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1076996"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/24/2","reference_id":"2","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T16:13:40Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/24/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2299654","reference_id":"2299654","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2299654"},{"reference_url":"https://hackerone.com/reports/2604391","reference_id":"2604391","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T16:13:40Z/"}],"url":"https://hackerone.com/reports/2604391"},{"reference_url":"https://curl.se/docs/CVE-2024-6874.html","reference_id":"CVE-2024-6874.html","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T16:13:40Z/"}],"url":"https://curl.se/docs/CVE-2024-6874.html"},{"reference_url":"https://curl.se/docs/CVE-2024-6874.json","reference_id":"CVE-2024-6874.json","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-24T16:13:40Z/"}],"url":"https://curl.se/docs/CVE-2024-6874.json"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583078?format=json","purl":"pkg:deb/debian/curl@8.9.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.9.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2024-6874"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-my7a-jeng-5bhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50089?format=json","vulnerability_id":"VCID-n51k-39uk-auca","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in information disclosure or data loss.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8286.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8286.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8286","reference_id":"","reference_type":"","scores":[{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52054","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52128","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52113","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52154","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52157","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52139","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52086","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00286","scoring_system":"epss","scoring_elements":"0.52092","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59683","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59638","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59564","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59717","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59697","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59662","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00384","scoring_system":"epss","scoring_elements":"0.59632","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8286"},{"reference_url":"https://curl.se/docs/CVE-2020-8286.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"}],"url":"https://curl.se/docs/CVE-2020-8286.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1048457","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"}],"url":"https://hackerone.com/reports/1048457"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1906096","reference_id":"1906096","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1906096"},{"reference_url":"http://seclists.org/fulldisclosure/2021/Apr/50","reference_id":"50","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"}],"url":"http://seclists.org/fulldisclosure/2021/Apr/50"},{"reference_url":"http://seclists.org/fulldisclosure/2021/Apr/51","reference_id":"51","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"}],"url":"http://seclists.org/fulldisclosure/2021/Apr/51"},{"reference_url":"http://seclists.org/fulldisclosure/2021/Apr/54","reference_id":"54","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"}],"url":"http://seclists.org/fulldisclosure/2021/Apr/54"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977161","reference_id":"977161","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977161"},{"reference_url":"https://security.archlinux.org/AVG-1337","reference_id":"AVG-1337","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1337"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8286","reference_id":"CVE-2020-8286","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8286"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/","reference_id":"DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/"},{"reference_url":"https://www.debian.org/security/2021/dsa-4881","reference_id":"dsa-4881","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"}],"url":"https://www.debian.org/security/2021/dsa-4881"},{"reference_url":"https://security.gentoo.org/glsa/202012-14","reference_id":"GLSA-202012-14","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"}],"url":"https://security.gentoo.org/glsa/202012-14"},{"reference_url":"https://support.apple.com/kb/HT212325","reference_id":"HT212325","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"}],"url":"https://support.apple.com/kb/HT212325"},{"reference_url":"https://support.apple.com/kb/HT212326","reference_id":"HT212326","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"}],"url":"https://support.apple.com/kb/HT212326"},{"reference_url":"https://support.apple.com/kb/HT212327","reference_id":"HT212327","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"}],"url":"https://support.apple.com/kb/HT212327"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html","reference_id":"msg00029.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210122-0007/","reference_id":"ntap-20210122-0007","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210122-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/","reference_id":"NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1610","reference_id":"RHSA-2021:1610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2471","reference_id":"RHSA-2021:2471","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2471"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2472","reference_id":"RHSA-2021:2472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2472"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf","reference_id":"ssa-200951.pdf","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T15:29:39Z/"}],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-200951.pdf"},{"reference_url":"https://usn.ubuntu.com/4665-1/","reference_id":"USN-4665-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4665-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586313?format=json","purl":"pkg:deb/debian/curl@7.74.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2020-8286"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n51k-39uk-auca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57262?format=json","vulnerability_id":"VCID-n57n-cymy-z7dr","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23916.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23916.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-23916","reference_id":"","reference_type":"","scores":[{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25744","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2607","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2611","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25878","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25948","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25999","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.26009","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25964","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25905","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25909","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.2589","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25861","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25798","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25791","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-23916"},{"reference_url":"https://curl.se/docs/CVE-2023-23916.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-23916.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23916","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23916"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1826048","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T18:24:35Z/"}],"url":"https://hackerone.com/reports/1826048"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031371","reference_id":"1031371","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031371"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2167815","reference_id":"2167815","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2167815"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQKE6TXYDHOTFHLTBZ5X73GTKI7II5KO/","reference_id":"BQKE6TXYDHOTFHLTBZ5X73GTKI7II5KO","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T18:24:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQKE6TXYDHOTFHLTBZ5X73GTKI7II5KO/"},{"reference_url":"https://www.debian.org/security/2023/dsa-5365","reference_id":"dsa-5365","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T18:24:35Z/"}],"url":"https://www.debian.org/security/2023/dsa-5365"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T18:24:35Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00035.html","reference_id":"msg00035.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T18:24:35Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00035.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230309-0006/","reference_id":"ntap-20230309-0006","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-12T18:24:35Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230309-0006/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1140","reference_id":"RHSA-2023:1140","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1140"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1701","reference_id":"RHSA-2023:1701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1842","reference_id":"RHSA-2023:1842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3354","reference_id":"RHSA-2023:3354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3354"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3355","reference_id":"RHSA-2023:3355","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3460","reference_id":"RHSA-2023:3460","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3460"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4139","reference_id":"RHSA-2023:4139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4139"},{"reference_url":"https://usn.ubuntu.com/5891-1/","reference_id":"USN-5891-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5891-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586100?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/586101?format=json","purl":"pkg:deb/debian/curl@7.88.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2023-23916"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n57n-cymy-z7dr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96494?format=json","vulnerability_id":"VCID-nvzd-v3bs-6qek","summary":"When doing SSH-based transfers using either SCP or SFTP, and setting the known_hosts file, libcurl could still mistakenly accept connecting to hosts *not present* in the specified file if they were added as recognized in the libssh *global* known_hosts file.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-15079.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-15079.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-15079","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10292","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10257","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10428","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10388","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10366","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10237","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10208","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1034","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1032","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10312","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10359","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1026","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10333","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10399","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-15079"},{"reference_url":"https://curl.se/docs/CVE-2025-15079.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:45:34Z/"}],"url":"https://curl.se/docs/CVE-2025-15079.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15079","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15079"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/3477116","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:45:34Z/"}],"url":"https://hackerone.com/reports/3477116"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426409","reference_id":"2426409","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426409"},{"reference_url":"https://curl.se/docs/CVE-2025-15079.json","reference_id":"CVE-2025-15079.json","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:45:34Z/"}],"url":"https://curl.se/docs/CVE-2025-15079.json"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6893","reference_id":"RHSA-2026:6893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6893"},{"reference_url":"https://usn.ubuntu.com/8062-1/","reference_id":"USN-8062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8062-1/"},{"reference_url":"https://usn.ubuntu.com/8062-2/","reference_id":"USN-8062-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8062-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/921944?format=json","purl":"pkg:deb/debian/curl@8.18.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.18.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2025-15079"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nvzd-v3bs-6qek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61669?format=json","vulnerability_id":"VCID-ph5u-5j8n-4qah","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22898.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22898.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22898","reference_id":"","reference_type":"","scores":[{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31806","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31849","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31791","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.3182","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31935","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31977","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31797","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31879","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31882","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31843","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31808","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.3184","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33263","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33283","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33183","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22898"},{"reference_url":"https://curl.se/docs/CVE-2021-22898.html","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"}],"url":"https://curl.se/docs/CVE-2021-22898.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1176461","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"}],"url":"https://hackerone.com/reports/1176461"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1964887","reference_id":"1964887","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1964887"},{"reference_url":"https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde","reference_id":"39ce47f219b09c380b81f89fe54ac586c8db6bde","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"}],"url":"https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/07/21/4","reference_id":"4","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"}],"url":"http://www.openwall.com/lists/oss-security/2021/07/21/4"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989228","reference_id":"989228","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989228"},{"reference_url":"https://security.archlinux.org/ASA-202106-4","reference_id":"ASA-202106-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-4"},{"reference_url":"https://security.archlinux.org/ASA-202106-5","reference_id":"ASA-202106-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-5"},{"reference_url":"https://security.archlinux.org/ASA-202106-6","reference_id":"ASA-202106-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-6"},{"reference_url":"https://security.archlinux.org/ASA-202106-7","reference_id":"ASA-202106-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-7"},{"reference_url":"https://security.archlinux.org/ASA-202106-8","reference_id":"ASA-202106-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-8"},{"reference_url":"https://security.archlinux.org/ASA-202106-9","reference_id":"ASA-202106-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-9"},{"reference_url":"https://security.archlinux.org/AVG-1995","reference_id":"AVG-1995","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1995"},{"reference_url":"https://security.archlinux.org/AVG-1996","reference_id":"AVG-1996","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1996"},{"reference_url":"https://security.archlinux.org/AVG-1997","reference_id":"AVG-1997","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1997"},{"reference_url":"https://security.archlinux.org/AVG-1998","reference_id":"AVG-1998","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1998"},{"reference_url":"https://security.archlinux.org/AVG-1999","reference_id":"AVG-1999","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1999"},{"reference_url":"https://security.archlinux.org/AVG-2000","reference_id":"AVG-2000","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2000"},{"reference_url":"https://www.debian.org/security/2022/dsa-5197","reference_id":"dsa-5197","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"}],"url":"https://www.debian.org/security/2022/dsa-5197"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/","reference_id":"FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/"},{"reference_url":"https://security.gentoo.org/glsa/202105-36","reference_id":"GLSA-202105-36","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202105-36"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/","reference_id":"POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4511","reference_id":"RHSA-2021:4511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4511"},{"reference_url":"https://usn.ubuntu.com/5021-1/","reference_id":"USN-5021-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5021-1/"},{"reference_url":"https://usn.ubuntu.com/5021-2/","reference_id":"USN-5021-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5021-2/"},{"reference_url":"https://usn.ubuntu.com/5894-1/","reference_id":"USN-5894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5894-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582658?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584001?format=json","purl":"pkg:deb/debian/curl@7.79.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.79.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2021-22898"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ph5u-5j8n-4qah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41495?format=json","vulnerability_id":"VCID-prff-34kh-kbat","summary":"Multiple vulnerabilities have been found in cURL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"http://curl.haxx.se/docs/adv_20130412.html","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/docs/adv_20130412.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0771.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0771.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1944.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1944.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1944","reference_id":"","reference_type":"","scores":[{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85343","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85344","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85223","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85234","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85253","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85255","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85277","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85285","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85298","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85295","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85315","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85316","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85312","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85335","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1944"},{"reference_url":"https://curl.se/docs/CVE-2013-1944.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2013-1944.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944"},{"reference_url":"http://secunia.com/advisories/53044","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/53044"},{"reference_url":"http://secunia.com/advisories/53051","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/53051"},{"reference_url":"http://secunia.com/advisories/53097","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/53097"},{"reference_url":"https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66"},{"reference_url":"https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121","reference_id":"","reference_type":"","scores":[],"url":"https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121"},{"reference_url":"http://www.debian.org/security/2012/dsa-2660","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2012/dsa-2660"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:151","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:151"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"reference_url":"http://www.osvdb.org/92316","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/92316"},{"reference_url":"http://www.securityfocus.com/bid/59058","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/59058"},{"reference_url":"http://www.ubuntu.com/usn/USN-1801-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1801-1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=705274","reference_id":"705274","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=705274"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=950577","reference_id":"950577","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=950577"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.1:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.1:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.1:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1944","reference_id":"CVE-2013-1944","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1944"},{"reference_url":"https://security.gentoo.org/glsa/201401-14","reference_id":"GLSA-201401-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0771","reference_id":"RHSA-2013:0771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0771"},{"reference_url":"https://usn.ubuntu.com/1801-1/","reference_id":"USN-1801-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1801-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584357?format=json","purl":"pkg:deb/debian/curl@7.29.0-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.29.0-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-1944"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-prff-34kh-kbat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72951?format=json","vulnerability_id":"VCID-pwn6-j8vf-rufk","summary":"curl: HSTS subdomain overwrites parent cache entry","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9681.json","reference_id":"","reference_type":"","scores":[{"value":"3.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9681.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-9681","reference_id":"","reference_type":"","scores":[{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72654","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.7259","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72572","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72562","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72605","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72615","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72606","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72648","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72657","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72522","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72539","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72515","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72554","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00725","scoring_system":"epss","scoring_elements":"0.72566","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-9681"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9681","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9681"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086804","reference_id":"1086804","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086804"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322969","reference_id":"2322969","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2322969"},{"reference_url":"https://hackerone.com/reports/2764830","reference_id":"2764830","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:16:59Z/"}],"url":"https://hackerone.com/reports/2764830"},{"reference_url":"https://curl.se/docs/CVE-2024-9681.html","reference_id":"CVE-2024-9681.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:16:59Z/"}],"url":"https://curl.se/docs/CVE-2024-9681.html"},{"reference_url":"https://curl.se/docs/CVE-2024-9681.json","reference_id":"CVE-2024-9681.json","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-06T16:16:59Z/"}],"url":"https://curl.se/docs/CVE-2024-9681.json"},{"reference_url":"https://usn.ubuntu.com/7104-1/","reference_id":"USN-7104-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7104-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/921939?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/921940?format=json","purl":"pkg:deb/debian/curl@8.11.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.11.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2024-9681"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pwn6-j8vf-rufk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49265?format=json","vulnerability_id":"VCID-q229-ag6u-u3hv","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22576.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22576.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22576","reference_id":"","reference_type":"","scores":[{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50585","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50613","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56608","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.5669","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56669","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56699","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56697","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.5667","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56607","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00339","scoring_system":"epss","scoring_elements":"0.56625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58012","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.5801","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58028","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22576"},{"reference_url":"https://curl.se/docs/CVE-2022-22576.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-22576.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1526328","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-16T14:05:38Z/"}],"url":"https://hackerone.com/reports/1526328"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010295","reference_id":"1010295","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010295"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077541","reference_id":"2077541","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077541"},{"reference_url":"https://security.archlinux.org/AVG-2685","reference_id":"AVG-2685","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2685"},{"reference_url":"https://www.debian.org/security/2022/dsa-5197","reference_id":"dsa-5197","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-16T14:05:38Z/"}],"url":"https://www.debian.org/security/2022/dsa-5197"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-16T14:05:38Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-16T14:05:38Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220609-0008/","reference_id":"ntap-20220609-0008","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-04-16T14:05:38Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220609-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5245","reference_id":"RHSA-2022:5245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5313","reference_id":"RHSA-2022:5313","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5313"},{"reference_url":"https://usn.ubuntu.com/5397-1/","reference_id":"USN-5397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5397-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582658?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582659?format=json","purl":"pkg:deb/debian/curl@7.83.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2022-22576"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q229-ag6u-u3hv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49766?format=json","vulnerability_id":"VCID-q3hu-8uy5-e3a4","summary":"A coding error has been found in cURL, causing the TLS Certificate\n    Status Request extension check to always return true.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2629.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2629.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2629","reference_id":"","reference_type":"","scores":[{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58261","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58349","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58416","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58395","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58376","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58408","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58413","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.5839","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58352","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58363","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58366","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.5834","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58393","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58399","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2629"},{"reference_url":"https://curl.se/docs/CVE-2017-2629.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2017-2629.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2629"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1425746","reference_id":"1425746","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1425746"},{"reference_url":"https://security.archlinux.org/ASA-201703-1","reference_id":"ASA-201703-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201703-1"},{"reference_url":"https://security.archlinux.org/AVG-179","reference_id":"AVG-179","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-179"},{"reference_url":"https://security.archlinux.org/AVG-180","reference_id":"AVG-180","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-180"},{"reference_url":"https://security.archlinux.org/AVG-181","reference_id":"AVG-181","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-181"},{"reference_url":"https://security.archlinux.org/AVG-182","reference_id":"AVG-182","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-182"},{"reference_url":"https://security.archlinux.org/AVG-183","reference_id":"AVG-183","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-183"},{"reference_url":"https://security.archlinux.org/AVG-184","reference_id":"AVG-184","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-184"},{"reference_url":"https://security.gentoo.org/glsa/201703-04","reference_id":"GLSA-201703-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201703-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585398?format=json","purl":"pkg:deb/debian/curl@7.52.1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.52.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2017-2629"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q3hu-8uy5-e3a4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49260?format=json","vulnerability_id":"VCID-qbpd-star-6fgn","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22923.json","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22923.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22923","reference_id":"","reference_type":"","scores":[{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25873","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25626","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25868","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25879","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25838","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25782","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25784","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25766","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25738","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25683","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25674","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25937","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25978","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25745","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25816","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22923"},{"reference_url":"https://curl.se/docs/CVE-2021-22923.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2021-22923.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22923"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1213181","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:25:07Z/"}],"url":"https://hackerone.com/reports/1213181"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1981438","reference_id":"1981438","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1981438"},{"reference_url":"https://security.archlinux.org/ASA-202107-59","reference_id":"ASA-202107-59","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-59"},{"reference_url":"https://security.archlinux.org/AVG-2194","reference_id":"AVG-2194","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2194"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/","reference_id":"FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:25:07Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:25:07Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210902-0003/","reference_id":"ntap-20210902-0003","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:25:07Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210902-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3582","reference_id":"RHSA-2021:3582","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3582"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3903","reference_id":"RHSA-2021:3903","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3903"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584001?format=json","purl":"pkg:deb/debian/curl@7.79.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.79.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2021-22923"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qbpd-star-6fgn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47208?format=json","vulnerability_id":"VCID-qdcn-2u3v-b3cv","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46218.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-46218.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46218","reference_id":"","reference_type":"","scores":[{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60611","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60612","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60591","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60632","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60637","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60625","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.6061","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60621","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60627","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62608","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62641","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62656","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62672","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-46218"},{"reference_url":"https://curl.se/docs/CVE-2023-46218.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-46218.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46218"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/2212193","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/2212193"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057646","reference_id":"1057646","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057646"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2252030","reference_id":"2252030","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2252030"},{"reference_url":"https://security.gentoo.org/glsa/202409-20","reference_id":"GLSA-202409-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0428","reference_id":"RHSA-2024:0428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0434","reference_id":"RHSA-2024:0434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0452","reference_id":"RHSA-2024:0452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0585","reference_id":"RHSA-2024:0585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0585"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1129","reference_id":"RHSA-2024:1129","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1129"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1316","reference_id":"RHSA-2024:1316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1317","reference_id":"RHSA-2024:1317","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1383","reference_id":"RHSA-2024:1383","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1383"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1601","reference_id":"RHSA-2024:1601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2092","reference_id":"RHSA-2024:2092","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2092"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2093","reference_id":"RHSA-2024:2093","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2093"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2094","reference_id":"RHSA-2024:2094","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2094"},{"reference_url":"https://usn.ubuntu.com/6535-1/","reference_id":"USN-6535-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6535-1/"},{"reference_url":"https://usn.ubuntu.com/6641-1/","reference_id":"USN-6641-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6641-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/587036?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u11?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/587037?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/587038?format=json","purl":"pkg:deb/debian/curl@8.5.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.5.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2023-46218"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qdcn-2u3v-b3cv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39485?format=json","vulnerability_id":"VCID-qka4-jfdb-w3d5","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which can allow remote attackers to cause Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3144.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3144.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3144","reference_id":"","reference_type":"","scores":[{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77158","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77008","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77013","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77043","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77023","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77055","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77066","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77094","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77074","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77069","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.7711","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77112","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77102","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77137","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01008","scoring_system":"epss","scoring_elements":"0.77143","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3144"},{"reference_url":"https://curl.se/docs/CVE-2015-3144.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2015-3144.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3144","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3144"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1213335","reference_id":"1213335","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1213335"},{"reference_url":"https://security.gentoo.org/glsa/201509-02","reference_id":"GLSA-201509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201509-02"},{"reference_url":"https://usn.ubuntu.com/2591-1/","reference_id":"USN-2591-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2591-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586640?format=json","purl":"pkg:deb/debian/curl@7.42.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.42.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2015-3144"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qka4-jfdb-w3d5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82462?format=json","vulnerability_id":"VCID-qpfa-s6sd-8yct","summary":"curl: Windows OpenSSL engine code injection","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5443.json","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5443.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5443","reference_id":"","reference_type":"","scores":[{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76247","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76205","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76186","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76226","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00935","scoring_system":"epss","scoring_elements":"0.76235","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00953","scoring_system":"epss","scoring_elements":"0.76359","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00953","scoring_system":"epss","scoring_elements":"0.76405","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00953","scoring_system":"epss","scoring_elements":"0.76431","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00953","scoring_system":"epss","scoring_elements":"0.76409","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00953","scoring_system":"epss","scoring_elements":"0.76404","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00953","scoring_system":"epss","scoring_elements":"0.76444","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00953","scoring_system":"epss","scoring_elements":"0.76346","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00953","scoring_system":"epss","scoring_elements":"0.76392","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00953","scoring_system":"epss","scoring_elements":"0.7635","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00953","scoring_system":"epss","scoring_elements":"0.76379","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5443"},{"reference_url":"https://curl.se/docs/CVE-2019-5443.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2019-5443.html"},{"reference_url":"https://hackerone.com/reports/608577","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/608577"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1772100","reference_id":"1772100","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1772100"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2019-5443"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qpfa-s6sd-8yct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66608?format=json","vulnerability_id":"VCID-qpux-jh6k-8qhx","summary":"curl: Curl missing SFTP host verification with wolfSSH backend","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10966.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10966.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-10966","reference_id":"","reference_type":"","scores":[{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04624","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05252","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05467","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05288","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05309","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05274","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0526","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05246","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05191","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07117","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07123","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07083","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07019","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07151","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-10966"},{"reference_url":"https://curl.se/docs/CVE-2025-10966.html","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-10T20:26:03Z/"}],"url":"https://curl.se/docs/CVE-2025-10966.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10966","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10966"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/3355218","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-10T20:26:03Z/"}],"url":"https://hackerone.com/reports/3355218"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2413308","reference_id":"2413308","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2413308"},{"reference_url":"https://curl.se/docs/CVE-2025-10966.json","reference_id":"CVE-2025-10966.json","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-10T20:26:03Z/"}],"url":"https://curl.se/docs/CVE-2025-10966.json"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6893","reference_id":"RHSA-2026:6893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6893"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/921942?format=json","purl":"pkg:deb/debian/curl@8.17.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.17.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2025-10966"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qpux-jh6k-8qhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36349?format=json","vulnerability_id":"VCID-r3ny-7kn7-ukaa","summary":"An error in the X.509 certificate handling of cURL might enable remote\n    attackers to conduct man-in-the-middle attacks.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2417.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2417.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2417","reference_id":"","reference_type":"","scores":[{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91712","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91653","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91661","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91666","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91675","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91688","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91694","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91697","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.917","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91696","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91717","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.9171","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91716","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91714","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2417"},{"reference_url":"https://curl.se/docs/CVE-2009-2417.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2009-2417.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=516181","reference_id":"516181","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=516181"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=541991","reference_id":"541991","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=541991"},{"reference_url":"https://security.gentoo.org/glsa/200909-20","reference_id":"GLSA-200909-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200909-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1209","reference_id":"RHSA-2009:1209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1209"},{"reference_url":"https://usn.ubuntu.com/1158-1/","reference_id":"USN-1158-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1158-1/"},{"reference_url":"https://usn.ubuntu.com/818-1/","reference_id":"USN-818-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/818-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586169?format=json","purl":"pkg:deb/debian/curl@7.19.5-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.19.5-1.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2009-2417"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r3ny-7kn7-ukaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39489?format=json","vulnerability_id":"VCID-r447-deb8-2ydj","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which can allow remote attackers to cause Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3237.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3237.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3237","reference_id":"","reference_type":"","scores":[{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89882","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89818","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89821","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89835","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89839","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89857","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89863","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89869","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89867","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.8986","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89873","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89874","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89868","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05127","scoring_system":"epss","scoring_elements":"0.89883","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3237"},{"reference_url":"https://curl.se/docs/CVE-2015-3237.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2015-3237.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3237","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3237"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1233814","reference_id":"1233814","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1233814"},{"reference_url":"https://security.gentoo.org/glsa/201509-02","reference_id":"GLSA-201509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201509-02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583844?format=json","purl":"pkg:deb/debian/curl@7.43.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.43.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2015-3237"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r447-deb8-2ydj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49268?format=json","vulnerability_id":"VCID-r7bh-7wur-xffs","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27776.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27776.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27776","reference_id":"","reference_type":"","scores":[{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71695","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71605","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71616","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71639","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71623","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71604","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71649","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71654","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71636","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71685","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.7169","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71574","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71592","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71565","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27776"},{"reference_url":"https://curl.se/docs/CVE-2022-27776.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-27776.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1547048","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"}],"url":"https://hackerone.com/reports/1547048"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010252","reference_id":"1010252","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010252"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2078408","reference_id":"2078408","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2078408"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/","reference_id":"7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/"},{"reference_url":"https://security.archlinux.org/AVG-2685","reference_id":"AVG-2685","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2685"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/","reference_id":"DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/"},{"reference_url":"https://www.debian.org/security/2022/dsa-5197","reference_id":"dsa-5197","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"}],"url":"https://www.debian.org/security/2022/dsa-5197"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220609-0008/","reference_id":"ntap-20220609-0008","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220609-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5245","reference_id":"RHSA-2022:5245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5313","reference_id":"RHSA-2022:5313","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5313"},{"reference_url":"https://usn.ubuntu.com/5397-1/","reference_id":"USN-5397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5397-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582658?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582659?format=json","purl":"pkg:deb/debian/curl@7.83.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2022-27776"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r7bh-7wur-xffs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49280?format=json","vulnerability_id":"VCID-rg54-svzj-x7f9","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35260.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35260.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-35260","reference_id":"","reference_type":"","scores":[{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.3993","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00182","scoring_system":"epss","scoring_elements":"0.39957","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41282","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41333","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41341","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41362","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46919","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.4687","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48647","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48631","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48632","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48645","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48694","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.4869","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-35260"},{"reference_url":"https://curl.se/docs/CVE-2022-35260.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-35260.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1721098","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/"}],"url":"https://hackerone.com/reports/1721098"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jan/19","reference_id":"19","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jan/19"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jan/20","reference_id":"20","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jan/20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2135412","reference_id":"2135412","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2135412"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://support.apple.com/kb/HT213604","reference_id":"HT213604","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/"}],"url":"https://support.apple.com/kb/HT213604"},{"reference_url":"https://support.apple.com/kb/HT213605","reference_id":"HT213605","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/"}],"url":"https://support.apple.com/kb/HT213605"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230110-0006/","reference_id":"ntap-20230110-0006","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:48:27Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230110-0006/"},{"reference_url":"https://usn.ubuntu.com/5702-1/","reference_id":"USN-5702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583300?format=json","purl":"pkg:deb/debian/curl@7.86.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.86.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2022-35260"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rg54-svzj-x7f9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49270?format=json","vulnerability_id":"VCID-rhxh-77pj-1bfy","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27780.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27780.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27780","reference_id":"","reference_type":"","scores":[{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36259","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36683","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36692","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36658","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36632","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36677","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36659","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36599","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36375","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36345","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36748","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36779","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36615","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36667","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27780"},{"reference_url":"https://curl.se/docs/CVE-2022-27780.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-27780.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1553841","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T20:10:43Z/"}],"url":"https://hackerone.com/reports/1553841"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082203","reference_id":"2082203","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082203"},{"reference_url":"https://security.archlinux.org/AVG-2706","reference_id":"AVG-2706","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2706"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T20:10:43Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220609-0009/","reference_id":"ntap-20220609-0009","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T20:10:43Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220609-0009/"},{"reference_url":"https://usn.ubuntu.com/5412-1/","reference_id":"USN-5412-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5412-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582920?format=json","purl":"pkg:deb/debian/curl@7.83.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2022-27780"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rhxh-77pj-1bfy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50087?format=json","vulnerability_id":"VCID-rmez-cwu2-2ya7","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in information disclosure or data loss.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8284.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8284.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8284","reference_id":"","reference_type":"","scores":[{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.27969","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28391","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.283","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28321","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28408","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28411","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28368","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2831","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28466","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28508","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28364","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28543","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28767","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28655","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8284"},{"reference_url":"https://curl.se/docs/CVE-2020-8284.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"}],"url":"https://curl.se/docs/CVE-2020-8284.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1040166","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"}],"url":"https://hackerone.com/reports/1040166"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1902667","reference_id":"1902667","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1902667"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977163","reference_id":"977163","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977163"},{"reference_url":"https://security.archlinux.org/AVG-1337","reference_id":"AVG-1337","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1337"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/","reference_id":"DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/"},{"reference_url":"https://www.debian.org/security/2021/dsa-4881","reference_id":"dsa-4881","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"}],"url":"https://www.debian.org/security/2021/dsa-4881"},{"reference_url":"https://security.gentoo.org/glsa/202012-14","reference_id":"GLSA-202012-14","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"}],"url":"https://security.gentoo.org/glsa/202012-14"},{"reference_url":"https://support.apple.com/kb/HT212325","reference_id":"HT212325","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"}],"url":"https://support.apple.com/kb/HT212325"},{"reference_url":"https://support.apple.com/kb/HT212326","reference_id":"HT212326","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"}],"url":"https://support.apple.com/kb/HT212326"},{"reference_url":"https://support.apple.com/kb/HT212327","reference_id":"HT212327","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"}],"url":"https://support.apple.com/kb/HT212327"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html","reference_id":"msg00029.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210122-0007/","reference_id":"ntap-20210122-0007","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210122-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/","reference_id":"NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1610","reference_id":"RHSA-2021:1610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2471","reference_id":"RHSA-2021:2471","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2471"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2472","reference_id":"RHSA-2021:2472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2472"},{"reference_url":"https://usn.ubuntu.com/4665-1/","reference_id":"USN-4665-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4665-1/"},{"reference_url":"https://usn.ubuntu.com/4665-2/","reference_id":"USN-4665-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4665-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586313?format=json","purl":"pkg:deb/debian/curl@7.74.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2020-8284"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rmez-cwu2-2ya7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/354619?format=json","vulnerability_id":"VCID-rsgn-r3yp-nkb6","summary":"","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-6253.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-6253.json"},{"reference_url":"https://curl.se/docs/CVE-2026-6253.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2026-6253.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6253","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6253"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/3669637","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/3669637"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2461202","reference_id":"2461202","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2461202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:12916","reference_id":"RHSA-2026:12916","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:12916"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2026-6253"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rsgn-r3yp-nkb6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57269?format=json","vulnerability_id":"VCID-s73y-y7v7-43cm","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28322.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28322.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28322","reference_id":"","reference_type":"","scores":[{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68992","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68981","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.6893","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68987","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70255","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70238","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70341","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70331","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70289","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70302","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70317","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70294","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70278","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70232","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28322"},{"reference_url":"https://curl.se/docs/CVE-2023-28322.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-28322.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28322"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1954658","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://hackerone.com/reports/1954658"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239","reference_id":"1036239","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196793","reference_id":"2196793","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196793"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/47","reference_id":"47","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/47"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/48","reference_id":"48","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/48"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/52","reference_id":"52","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/52"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/","reference_id":"F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://support.apple.com/kb/HT213843","reference_id":"HT213843","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://support.apple.com/kb/HT213843"},{"reference_url":"https://support.apple.com/kb/HT213844","reference_id":"HT213844","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://support.apple.com/kb/HT213844"},{"reference_url":"https://support.apple.com/kb/HT213845","reference_id":"HT213845","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://support.apple.com/kb/HT213845"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230609-0009/","reference_id":"ntap-20230609-0009","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230609-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4354","reference_id":"RHSA-2023:4354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4354"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4628","reference_id":"RHSA-2023:4628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4629","reference_id":"RHSA-2023:4629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5598","reference_id":"RHSA-2023:5598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0428","reference_id":"RHSA-2024:0428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0585","reference_id":"RHSA-2024:0585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0585"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1601","reference_id":"RHSA-2024:1601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2092","reference_id":"RHSA-2024:2092","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2092"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2093","reference_id":"RHSA-2024:2093","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2093"},{"reference_url":"https://usn.ubuntu.com/6237-1/","reference_id":"USN-6237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6237-1/"},{"reference_url":"https://usn.ubuntu.com/6237-3/","reference_id":"USN-6237-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6237-3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/","reference_id":"Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583791?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583792?format=json","purl":"pkg:deb/debian/curl@7.88.1-10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2023-28322"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s73y-y7v7-43cm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49263?format=json","vulnerability_id":"VCID-sh5a-fmna-wffr","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22946.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22946","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19479","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19491","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19373","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19382","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19335","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23143","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23365","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23154","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23277","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2322","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23204","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23261","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23322","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23299","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22946"},{"reference_url":"https://curl.se/docs/CVE-2021-22946.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2021-22946.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1334111","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"}],"url":"https://hackerone.com/reports/1334111"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017589","reference_id":"1017589","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1017589"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2003175","reference_id":"2003175","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2003175"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Mar/29","reference_id":"29","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Mar/29"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/","reference_id":"APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/"},{"reference_url":"https://security.archlinux.org/AVG-2384","reference_id":"AVG-2384","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2384"},{"reference_url":"https://security.archlinux.org/AVG-2385","reference_id":"AVG-2385","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2385"},{"reference_url":"https://security.archlinux.org/AVG-2386","reference_id":"AVG-2386","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2386"},{"reference_url":"https://security.archlinux.org/AVG-2387","reference_id":"AVG-2387","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2387"},{"reference_url":"https://security.archlinux.org/AVG-2388","reference_id":"AVG-2388","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2388"},{"reference_url":"https://security.archlinux.org/AVG-2389","reference_id":"AVG-2389","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2389"},{"reference_url":"https://www.debian.org/security/2022/dsa-5197","reference_id":"dsa-5197","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"}],"url":"https://www.debian.org/security/2022/dsa-5197"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://support.apple.com/kb/HT213183","reference_id":"HT213183","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"}],"url":"https://support.apple.com/kb/HT213183"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html","reference_id":"msg00022.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211029-0003/","reference_id":"ntap-20211029-0003","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211029-0003/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220121-0008/","reference_id":"ntap-20220121-0008","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220121-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4059","reference_id":"RHSA-2021:4059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4059"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0635","reference_id":"RHSA-2022:0635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0635"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1354","reference_id":"RHSA-2022:1354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1354"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/","reference_id":"RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:53:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/"},{"reference_url":"https://usn.ubuntu.com/5079-1/","reference_id":"USN-5079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5079-1/"},{"reference_url":"https://usn.ubuntu.com/5079-2/","reference_id":"USN-5079-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5079-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582658?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584001?format=json","purl":"pkg:deb/debian/curl@7.79.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.79.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2021-22946"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sh5a-fmna-wffr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57750?format=json","vulnerability_id":"VCID-sknq-8mm1-6qfe","summary":"security update","references":[{"reference_url":"http://curl.haxx.se/docs/adv_20140910A.html","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/docs/adv_20140910A.html"},{"reference_url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743","reference_id":"","reference_type":"","scores":[],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743"},{"reference_url":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1254.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1254.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3613.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3613.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3613","reference_id":"","reference_type":"","scores":[{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.8294","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82936","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82801","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82817","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.8283","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82826","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82851","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82858","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82874","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82868","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82864","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82903","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82905","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82926","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3613"},{"reference_url":"https://curl.se/docs/CVE-2014-3613.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2014-3613.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613"},{"reference_url":"https://support.apple.com/kb/HT205031","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT205031"},{"reference_url":"http://www.debian.org/security/2014/dsa-3022","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3022"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/69748","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69748"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1136154","reference_id":"1136154","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1136154"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3613","reference_id":"CVE-2014-3613","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3613"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1254","reference_id":"RHSA-2015:1254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1254"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2159","reference_id":"RHSA-2015:2159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2159"},{"reference_url":"https://usn.ubuntu.com/2346-1/","reference_id":"USN-2346-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2346-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586725?format=json","purl":"pkg:deb/debian/curl@7.38.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.38.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2014-3613"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sknq-8mm1-6qfe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/158821?format=json","vulnerability_id":"VCID-snaz-pg1h-8kew","summary":"cURL before 7.47.0 on Windows allows attackers to write to arbitrary files in the current working directory on a different drive via a colon in a remote file name.","references":[{"reference_url":"http://curl.haxx.se/docs/adv_20160127B.html","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/docs/adv_20160127B.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0754","reference_id":"","reference_type":"","scores":[{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57494","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57495","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57515","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57423","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57507","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57528","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57504","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57556","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.5756","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57575","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57555","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57533","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57561","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57557","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57537","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0754"},{"reference_url":"https://curl.se/docs/CVE-2016-0754.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-0754.html"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0754","reference_id":"CVE-2016-0754","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0754"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-0754"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-snaz-pg1h-8kew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/355415?format=json","vulnerability_id":"VCID-sshs-1k6e-cqer","summary":"","references":[{"reference_url":"https://curl.se/docs/CVE-2026-7168.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2026-7168.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-7168","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-7168"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/3697719","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/3697719"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2026-7168"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sshs-1k6e-cqer"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57264?format=json","vulnerability_id":"VCID-syz5-5y6f-s7er","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27534.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27534.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27534","reference_id":"","reference_type":"","scores":[{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19742","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19779","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19772","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20068","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20126","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19854","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19988","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20007","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19963","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19904","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19882","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19887","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19885","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27534"},{"reference_url":"https://curl.se/docs/CVE-2023-27534.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-27534.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27534","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27534"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1892351","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/1892351"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179069","reference_id":"2179069","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179069"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3354","reference_id":"RHSA-2023:3354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3354"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3355","reference_id":"RHSA-2023:3355","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6679","reference_id":"RHSA-2023:6679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6679"},{"reference_url":"https://usn.ubuntu.com/5964-1/","reference_id":"USN-5964-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5964-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584288?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584289?format=json","purl":"pkg:deb/debian/curl@7.88.1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2023-27534"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-syz5-5y6f-s7er"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49274?format=json","vulnerability_id":"VCID-t1fk-cbsx-j3gh","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32205.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32205.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32205","reference_id":"","reference_type":"","scores":[{"value":"0.02588","scoring_system":"epss","scoring_elements":"0.8564","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02588","scoring_system":"epss","scoring_elements":"0.85522","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02588","scoring_system":"epss","scoring_elements":"0.85539","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02588","scoring_system":"epss","scoring_elements":"0.85544","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02588","scoring_system":"epss","scoring_elements":"0.85564","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02588","scoring_system":"epss","scoring_elements":"0.85575","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02588","scoring_system":"epss","scoring_elements":"0.85589","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02588","scoring_system":"epss","scoring_elements":"0.85586","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02588","scoring_system":"epss","scoring_elements":"0.85581","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02588","scoring_system":"epss","scoring_elements":"0.85604","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02588","scoring_system":"epss","scoring_elements":"0.8561","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02588","scoring_system":"epss","scoring_elements":"0.85606","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02588","scoring_system":"epss","scoring_elements":"0.85628","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02588","scoring_system":"epss","scoring_elements":"0.85638","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32205"},{"reference_url":"https://curl.se/docs/CVE-2022-32205.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-32205.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1569946","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/"}],"url":"https://hackerone.com/reports/1569946"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2099296","reference_id":"2099296","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2099296"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Oct/28","reference_id":"28","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Oct/28"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Oct/41","reference_id":"41","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Oct/41"},{"reference_url":"https://security.archlinux.org/AVG-2771","reference_id":"AVG-2771","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2771"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/","reference_id":"BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/"},{"reference_url":"https://www.debian.org/security/2022/dsa-5197","reference_id":"dsa-5197","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/"}],"url":"https://www.debian.org/security/2022/dsa-5197"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://support.apple.com/kb/HT213488","reference_id":"HT213488","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/"}],"url":"https://support.apple.com/kb/HT213488"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220915-0003/","reference_id":"ntap-20220915-0003","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:54Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220915-0003/"},{"reference_url":"https://usn.ubuntu.com/5495-1/","reference_id":"USN-5495-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5495-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582658?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583413?format=json","purl":"pkg:deb/debian/curl@7.84.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.84.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2022-32205"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t1fk-cbsx-j3gh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49264?format=json","vulnerability_id":"VCID-t4gn-9fw8-gkc3","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22947.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22947","reference_id":"","reference_type":"","scores":[{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48616","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48666","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.486","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48714","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48656","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48718","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48669","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48657","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48683","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48665","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48668","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48641","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48671","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48614","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48662","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22947"},{"reference_url":"https://curl.se/docs/CVE-2021-22947.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2021-22947.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1334763","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"}],"url":"https://hackerone.com/reports/1334763"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2003191","reference_id":"2003191","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2003191"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Mar/29","reference_id":"29","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Mar/29"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/","reference_id":"APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/"},{"reference_url":"https://security.archlinux.org/AVG-2384","reference_id":"AVG-2384","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2384"},{"reference_url":"https://security.archlinux.org/AVG-2385","reference_id":"AVG-2385","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2385"},{"reference_url":"https://security.archlinux.org/AVG-2386","reference_id":"AVG-2386","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2386"},{"reference_url":"https://security.archlinux.org/AVG-2387","reference_id":"AVG-2387","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2387"},{"reference_url":"https://security.archlinux.org/AVG-2388","reference_id":"AVG-2388","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2388"},{"reference_url":"https://security.archlinux.org/AVG-2389","reference_id":"AVG-2389","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2389"},{"reference_url":"https://www.debian.org/security/2022/dsa-5197","reference_id":"dsa-5197","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"}],"url":"https://www.debian.org/security/2022/dsa-5197"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://support.apple.com/kb/HT213183","reference_id":"HT213183","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"}],"url":"https://support.apple.com/kb/HT213183"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html","reference_id":"msg00022.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/09/msg00022.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211029-0003/","reference_id":"ntap-20211029-0003","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211029-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4059","reference_id":"RHSA-2021:4059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4059"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0635","reference_id":"RHSA-2022:0635","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0635"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1354","reference_id":"RHSA-2022:1354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1354"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/","reference_id":"RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:17Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/"},{"reference_url":"https://usn.ubuntu.com/5079-1/","reference_id":"USN-5079-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5079-1/"},{"reference_url":"https://usn.ubuntu.com/5079-2/","reference_id":"USN-5079-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5079-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582658?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584001?format=json","purl":"pkg:deb/debian/curl@7.79.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.79.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2021-22947"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t4gn-9fw8-gkc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34688?format=json","vulnerability_id":"VCID-t753-w1ha-kqaz","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8151.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8151.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8151","reference_id":"","reference_type":"","scores":[{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62245","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62074","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62134","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62166","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62184","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62202","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.6222","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.6221","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62189","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62234","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62241","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62225","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62236","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62252","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8151"},{"reference_url":"https://curl.se/docs/CVE-2014-8151.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2014-8151.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1178698","reference_id":"1178698","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1178698"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2014-8151"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t753-w1ha-kqaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49267?format=json","vulnerability_id":"VCID-t8t6-9wa3-aub7","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27775.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27775.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27775","reference_id":"","reference_type":"","scores":[{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35535","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35883","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35656","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35624","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.36026","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.36057","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.3589","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.3594","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35964","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.3597","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35931","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35907","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35947","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35934","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27775"},{"reference_url":"https://curl.se/docs/CVE-2022-27775.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-27775.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1546268","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/1546268"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010253","reference_id":"1010253","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010253"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2078388","reference_id":"2078388","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2078388"},{"reference_url":"https://security.archlinux.org/AVG-2685","reference_id":"AVG-2685","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2685"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8299","reference_id":"RHSA-2022:8299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8299"},{"reference_url":"https://usn.ubuntu.com/5397-1/","reference_id":"USN-5397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5397-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582658?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582659?format=json","purl":"pkg:deb/debian/curl@7.83.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2022-27775"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t8t6-9wa3-aub7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/97812?format=json","vulnerability_id":"VCID-t9p4-2x7v-yfaq","summary":"","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0167","reference_id":"","reference_type":"","scores":[{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56114","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56103","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56112","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56109","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56074","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56091","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56749","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56789","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.5681","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56786","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56838","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56809","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56748","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56766","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0167"},{"reference_url":"https://curl.se/docs/CVE-2025-0167.html","reference_id":"","reference_type":"","scores":[{"value":"3.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-05T15:52:41Z/"}],"url":"https://curl.se/docs/CVE-2025-0167.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/2917232","reference_id":"","reference_type":"","scores":[{"value":"3.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-05T15:52:41Z/"}],"url":"https://hackerone.com/reports/2917232"},{"reference_url":"https://curl.se/docs/CVE-2025-0167.json","reference_id":"CVE-2025-0167.json","reference_type":"","scores":[{"value":"3.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-05T15:52:41Z/"}],"url":"https://curl.se/docs/CVE-2025-0167.json"},{"reference_url":"https://usn.ubuntu.com/8084-1/","reference_id":"USN-8084-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8084-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584850?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u11?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582847?format=json","purl":"pkg:deb/debian/curl@8.12.0%2Bgit20250209.89ed161%2Bds-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.12.0%252Bgit20250209.89ed161%252Bds-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2025-0167"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t9p4-2x7v-yfaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/19509?format=json","vulnerability_id":"VCID-tcqe-7skm-b3fz","summary":"Out-of-bounds Write\nThis flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \"let the host resolve the name\" could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38545.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38545.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38545","reference_id":"","reference_type":"","scores":[{"value":"0.2625","scoring_system":"epss","scoring_elements":"0.96303","published_at":"2026-04-13T12:55:00Z"},{"value":"0.2625","scoring_system":"epss","scoring_elements":"0.96316","published_at":"2026-04-18T12:55:00Z"},{"value":"0.2625","scoring_system":"epss","scoring_elements":"0.96312","published_at":"2026-04-16T12:55:00Z"},{"value":"0.2625","scoring_system":"epss","scoring_elements":"0.96278","published_at":"2026-04-04T12:55:00Z"},{"value":"0.2625","scoring_system":"epss","scoring_elements":"0.96292","published_at":"2026-04-08T12:55:00Z"},{"value":"0.2625","scoring_system":"epss","scoring_elements":"0.96283","published_at":"2026-04-07T12:55:00Z"},{"value":"0.2625","scoring_system":"epss","scoring_elements":"0.963","published_at":"2026-04-12T12:55:00Z"},{"value":"0.2625","scoring_system":"epss","scoring_elements":"0.96295","published_at":"2026-04-09T12:55:00Z"},{"value":"0.26747","scoring_system":"epss","scoring_elements":"0.96359","published_at":"2026-04-21T12:55:00Z"},{"value":"0.26747","scoring_system":"epss","scoring_elements":"0.96361","published_at":"2026-04-29T12:55:00Z"},{"value":"0.26747","scoring_system":"epss","scoring_elements":"0.9636","published_at":"2026-04-24T12:55:00Z"},{"value":"0.26747","scoring_system":"epss","scoring_elements":"0.96315","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/2187833","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/2187833"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241933","reference_id":"2241933","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241933"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/34","reference_id":"34","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/34"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/37","reference_id":"37","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/37"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/38","reference_id":"38","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/38"},{"reference_url":"https://security.archlinux.org/AVG-2845","reference_id":"AVG-2845","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2845"},{"reference_url":"https://security.archlinux.org/AVG-2846","reference_id":"AVG-2846","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2846"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38545","reference_id":"CVE-2023-38545","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38545"},{"reference_url":"https://curl.se/docs/CVE-2023-38545.html","reference_id":"CVE-2023-38545.HTML","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"}],"url":"https://curl.se/docs/CVE-2023-38545.html"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://www.secpod.com/blog/high-severity-heap-buffer-overflow-vulnerability/","reference_id":"high-severity-heap-buffer-overflow-vulnerability","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"}],"url":"https://www.secpod.com/blog/high-severity-heap-buffer-overflow-vulnerability/"},{"reference_url":"https://support.apple.com/kb/HT214036","reference_id":"HT214036","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"}],"url":"https://support.apple.com/kb/HT214036"},{"reference_url":"https://support.apple.com/kb/HT214057","reference_id":"HT214057","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"}],"url":"https://support.apple.com/kb/HT214057"},{"reference_url":"https://support.apple.com/kb/HT214058","reference_id":"HT214058","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"}],"url":"https://support.apple.com/kb/HT214058"},{"reference_url":"https://support.apple.com/kb/HT214063","reference_id":"HT214063","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"}],"url":"https://support.apple.com/kb/HT214063"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231027-0009/","reference_id":"ntap-20231027-0009","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231027-0009/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0005/","reference_id":"ntap-20240201-0005","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0005/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/","reference_id":"OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5700","reference_id":"RHSA-2023:5700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5763","reference_id":"RHSA-2023:5763","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5763"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6745","reference_id":"RHSA-2023:6745","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7625","reference_id":"RHSA-2023:7625","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7625"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7626","reference_id":"RHSA-2023:7626","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7626"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0797","reference_id":"RHSA-2024:0797","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0797"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2011","reference_id":"RHSA-2024:2011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2011"},{"reference_url":"https://usn.ubuntu.com/6429-1/","reference_id":"USN-6429-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6429-1/"},{"reference_url":"https://usn.ubuntu.com/6429-3/","reference_id":"USN-6429-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6429-3/"},{"reference_url":"https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868","reference_id":"viewtopic.php?f=8&t=8868","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-17T21:11:03Z/"}],"url":"https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586457?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/586458?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/586459?format=json","purl":"pkg:deb/debian/curl@8.3.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.3.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2023-38545"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tcqe-7skm-b3fz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47211?format=json","vulnerability_id":"VCID-tha5-fv3w-sub6","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2004.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2004.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2004","reference_id":"","reference_type":"","scores":[{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.74722","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.7469","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.74675","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.74644","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.74669","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.74642","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.74765","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.74762","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.74756","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.7472","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.74729","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.74685","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.74693","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00838","scoring_system":"epss","scoring_elements":"0.74713","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2004"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/27/1","reference_id":"1","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/27/1"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/19","reference_id":"19","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/19"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/20","reference_id":"20","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270500","reference_id":"2270500","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270500"},{"reference_url":"https://hackerone.com/reports/2384833","reference_id":"2384833","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"}],"url":"https://hackerone.com/reports/2384833"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/","reference_id":"2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/"},{"reference_url":"https://curl.se/docs/CVE-2024-2004.html","reference_id":"CVE-2024-2004.html","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"}],"url":"https://curl.se/docs/CVE-2024-2004.html"},{"reference_url":"https://curl.se/docs/CVE-2024-2004.json","reference_id":"CVE-2024-2004.json","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"}],"url":"https://curl.se/docs/CVE-2024-2004.json"},{"reference_url":"https://security.gentoo.org/glsa/202409-20","reference_id":"GLSA-202409-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-20"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/","reference_id":"GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/"},{"reference_url":"https://support.apple.com/kb/HT214118","reference_id":"HT214118","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"}],"url":"https://support.apple.com/kb/HT214118"},{"reference_url":"https://support.apple.com/kb/HT214119","reference_id":"HT214119","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"}],"url":"https://support.apple.com/kb/HT214119"},{"reference_url":"https://support.apple.com/kb/HT214120","reference_id":"HT214120","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"}],"url":"https://support.apple.com/kb/HT214120"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240524-0006/","reference_id":"ntap-20240524-0006","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-25T18:17:42Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240524-0006/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2693","reference_id":"RHSA-2024:2693","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2693"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2694","reference_id":"RHSA-2024:2694","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2694"},{"reference_url":"https://usn.ubuntu.com/6718-1/","reference_id":"USN-6718-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6718-1/"},{"reference_url":"https://usn.ubuntu.com/6718-3/","reference_id":"USN-6718-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6718-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584795?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584796?format=json","purl":"pkg:deb/debian/curl@8.7.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.7.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2024-2004"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tha5-fv3w-sub6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39487?format=json","vulnerability_id":"VCID-tmv3-fzje-sbck","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which can allow remote attackers to cause Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3148.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3148.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3148","reference_id":"","reference_type":"","scores":[{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82284","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82137","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.8215","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82172","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82168","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82195","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82202","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82221","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82214","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82208","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82244","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82245","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82268","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82279","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3148"},{"reference_url":"https://curl.se/docs/CVE-2015-3148.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2015-3148.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1213351","reference_id":"1213351","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1213351"},{"reference_url":"https://security.gentoo.org/glsa/201509-02","reference_id":"GLSA-201509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201509-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1254","reference_id":"RHSA-2015:1254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1254"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2159","reference_id":"RHSA-2015:2159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2159"},{"reference_url":"https://usn.ubuntu.com/2591-1/","reference_id":"USN-2591-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2591-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586640?format=json","purl":"pkg:deb/debian/curl@7.42.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.42.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2015-3148"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tmv3-fzje-sbck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34388?format=json","vulnerability_id":"VCID-tz47-j4ey-t7g6","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14618.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14618.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14618","reference_id":"","reference_type":"","scores":[{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65698","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65733","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65756","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65757","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65746","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65747","published_at":"2026-04-18T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69414","published_at":"2026-04-04T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69393","published_at":"2026-04-07T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69444","published_at":"2026-04-08T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.6946","published_at":"2026-04-09T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69481","published_at":"2026-04-11T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69466","published_at":"2026-04-12T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69398","published_at":"2026-04-02T12:55:00Z"},{"value":"0.006","scoring_system":"epss","scoring_elements":"0.69387","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14618"},{"reference_url":"https://curl.se/docs/CVE-2018-14618.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2018-14618.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1041605","reference_id":"1041605","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:54:10Z/"}],"url":"http://www.securitytracker.com/id/1041605"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1622707","reference_id":"1622707","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1622707"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908327","reference_id":"908327","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908327"},{"reference_url":"https://curl.haxx.se/docs/CVE-2018-14618.html","reference_id":"CVE-2018-14618.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:54:10Z/"}],"url":"https://curl.haxx.se/docs/CVE-2018-14618.html"},{"reference_url":"https://www.debian.org/security/2018/dsa-4286","reference_id":"dsa-4286","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:54:10Z/"}],"url":"https://www.debian.org/security/2018/dsa-4286"},{"reference_url":"https://security.gentoo.org/glsa/201903-03","reference_id":"GLSA-201903-03","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:54:10Z/"}],"url":"https://security.gentoo.org/glsa/201903-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1880","reference_id":"RHSA-2019:1880","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:54:10Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:1880"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14618","reference_id":"show_bug.cgi?id=CVE-2018-14618","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:54:10Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14618"},{"reference_url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0014","reference_id":"SNWLID-2018-0014","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:54:10Z/"}],"url":"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0014"},{"reference_url":"https://usn.ubuntu.com/3765-1/","reference_id":"USN-3765-1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:54:10Z/"}],"url":"https://usn.ubuntu.com/3765-1/"},{"reference_url":"https://usn.ubuntu.com/3765-2/","reference_id":"USN-3765-2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:54:10Z/"}],"url":"https://usn.ubuntu.com/3765-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583784?format=json","purl":"pkg:deb/debian/curl@7.62.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.62.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2018-14618"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tz47-j4ey-t7g6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47212?format=json","vulnerability_id":"VCID-u4bx-xqb3-vuef","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2398.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2398.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2398","reference_id":"","reference_type":"","scores":[{"value":"0.01622","scoring_system":"epss","scoring_elements":"0.81913","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01622","scoring_system":"epss","scoring_elements":"0.81874","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01622","scoring_system":"epss","scoring_elements":"0.81898","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01622","scoring_system":"epss","scoring_elements":"0.81908","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01962","scoring_system":"epss","scoring_elements":"0.83544","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01962","scoring_system":"epss","scoring_elements":"0.83504","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01962","scoring_system":"epss","scoring_elements":"0.83495","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01962","scoring_system":"epss","scoring_elements":"0.8347","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01962","scoring_system":"epss","scoring_elements":"0.83472","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01962","scoring_system":"epss","scoring_elements":"0.83457","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01962","scoring_system":"epss","scoring_elements":"0.83545","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01962","scoring_system":"epss","scoring_elements":"0.83509","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01962","scoring_system":"epss","scoring_elements":"0.83512","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01962","scoring_system":"epss","scoring_elements":"0.83519","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2398"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2398","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2398"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/19","reference_id":"19","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/19"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/20","reference_id":"20","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270498","reference_id":"2270498","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270498"},{"reference_url":"https://hackerone.com/reports/2402845","reference_id":"2402845","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"}],"url":"https://hackerone.com/reports/2402845"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/","reference_id":"2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/27/3","reference_id":"3","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/27/3"},{"reference_url":"https://curl.se/docs/CVE-2024-2398.html","reference_id":"CVE-2024-2398.html","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"},{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"}],"url":"https://curl.se/docs/CVE-2024-2398.html"},{"reference_url":"https://curl.se/docs/CVE-2024-2398.json","reference_id":"CVE-2024-2398.json","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"}],"url":"https://curl.se/docs/CVE-2024-2398.json"},{"reference_url":"https://security.gentoo.org/glsa/202409-20","reference_id":"GLSA-202409-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202409-20"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/","reference_id":"GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/"},{"reference_url":"https://support.apple.com/kb/HT214118","reference_id":"HT214118","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"}],"url":"https://support.apple.com/kb/HT214118"},{"reference_url":"https://support.apple.com/kb/HT214119","reference_id":"HT214119","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"}],"url":"https://support.apple.com/kb/HT214119"},{"reference_url":"https://support.apple.com/kb/HT214120","reference_id":"HT214120","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"}],"url":"https://support.apple.com/kb/HT214120"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240503-0009/","reference_id":"ntap-20240503-0009","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-26T18:57:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240503-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:10135","reference_id":"RHSA-2024:10135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:10135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11109","reference_id":"RHSA-2024:11109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2693","reference_id":"RHSA-2024:2693","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2693"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2694","reference_id":"RHSA-2024:2694","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2694"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3998","reference_id":"RHSA-2024:3998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5529","reference_id":"RHSA-2024:5529","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5529"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5654","reference_id":"RHSA-2024:5654","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5654"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7213","reference_id":"RHSA-2024:7213","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7213"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7374","reference_id":"RHSA-2024:7374","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7374"},{"reference_url":"https://usn.ubuntu.com/6718-1/","reference_id":"USN-6718-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6718-1/"},{"reference_url":"https://usn.ubuntu.com/6718-2/","reference_id":"USN-6718-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6718-2/"},{"reference_url":"https://usn.ubuntu.com/6718-3/","reference_id":"USN-6718-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6718-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584794?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u12?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u12%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584795?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584796?format=json","purl":"pkg:deb/debian/curl@8.7.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.7.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2024-2398"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u4bx-xqb3-vuef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84241?format=json","vulnerability_id":"VCID-u9jp-j1ds-73e7","summary":"curl: URL file scheme drive letter buffer overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9502.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9502.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9502","reference_id":"","reference_type":"","scores":[{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68058","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.6808","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68099","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68077","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68128","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68143","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68167","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68154","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68121","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68157","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.6817","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68152","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68195","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68204","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00555","scoring_system":"epss","scoring_elements":"0.68208","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-9502"},{"reference_url":"https://curl.se/docs/CVE-2017-9502.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2017-9502.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1461321","reference_id":"1461321","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1461321"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2017-9502"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u9jp-j1ds-73e7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74703?format=json","vulnerability_id":"VCID-v3qf-6wju-1bg8","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16890.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16890.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16890","reference_id":"","reference_type":"","scores":[{"value":"0.01397","scoring_system":"epss","scoring_elements":"0.80353","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01397","scoring_system":"epss","scoring_elements":"0.80347","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01397","scoring_system":"epss","scoring_elements":"0.80373","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01397","scoring_system":"epss","scoring_elements":"0.80362","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01397","scoring_system":"epss","scoring_elements":"0.80391","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01397","scoring_system":"epss","scoring_elements":"0.80402","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01397","scoring_system":"epss","scoring_elements":"0.8042","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01397","scoring_system":"epss","scoring_elements":"0.80405","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01397","scoring_system":"epss","scoring_elements":"0.80398","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01397","scoring_system":"epss","scoring_elements":"0.80428","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01397","scoring_system":"epss","scoring_elements":"0.80429","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01397","scoring_system":"epss","scoring_elements":"0.80432","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01397","scoring_system":"epss","scoring_elements":"0.80459","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01397","scoring_system":"epss","scoring_elements":"0.80465","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01397","scoring_system":"epss","scoring_elements":"0.80482","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16890"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:53:28Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16890"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:53:28Z/"}],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf"},{"reference_url":"https://curl.haxx.se/docs/CVE-2018-16890.html","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:53:28Z/"}],"url":"https://curl.haxx.se/docs/CVE-2018-16890.html"},{"reference_url":"https://curl.se/docs/CVE-2018-16890.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2018-16890.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:53:28Z/"}],"url":"https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190315-0001/","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:53:28Z/"}],"url":"https://security.netapp.com/advisory/ntap-20190315-0001/"},{"reference_url":"https://support.f5.com/csp/article/K03314397?utm_source=f5support&amp%3Butm_medium=RSS","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:53:28Z/"}],"url":"https://support.f5.com/csp/article/K03314397?utm_source=f5support&amp%3Butm_medium=RSS"},{"reference_url":"https://www.debian.org/security/2019/dsa-4386","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:53:28Z/"}],"url":"https://www.debian.org/security/2019/dsa-4386"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:53:28Z/"}],"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:53:28Z/"}],"url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"reference_url":"http://www.securityfocus.com/bid/106947","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:53:28Z/"}],"url":"http://www.securityfocus.com/bid/106947"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1670252","reference_id":"1670252","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1670252"},{"reference_url":"https://security.archlinux.org/ASA-201902-10","reference_id":"ASA-201902-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201902-10"},{"reference_url":"https://security.archlinux.org/ASA-201902-11","reference_id":"ASA-201902-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201902-11"},{"reference_url":"https://security.archlinux.org/ASA-201902-12","reference_id":"ASA-201902-12","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201902-12"},{"reference_url":"https://security.archlinux.org/ASA-201902-13","reference_id":"ASA-201902-13","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201902-13"},{"reference_url":"https://security.archlinux.org/ASA-201902-9","reference_id":"ASA-201902-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201902-9"},{"reference_url":"https://security.archlinux.org/AVG-873","reference_id":"AVG-873","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-873"},{"reference_url":"https://security.archlinux.org/AVG-874","reference_id":"AVG-874","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-874"},{"reference_url":"https://security.archlinux.org/AVG-875","reference_id":"AVG-875","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-875"},{"reference_url":"https://security.archlinux.org/AVG-876","reference_id":"AVG-876","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-876"},{"reference_url":"https://security.archlinux.org/AVG-877","reference_id":"AVG-877","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-877"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:siemens:sinema_remote_connect_client:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16890","reference_id":"CVE-2018-16890","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3701","reference_id":"RHSA-2019:3701","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:53:28Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3701"},{"reference_url":"https://usn.ubuntu.com/3882-1/","reference_id":"USN-3882-1","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:53:28Z/"}],"url":"https://usn.ubuntu.com/3882-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585517?format=json","purl":"pkg:deb/debian/curl@7.64.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.64.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2018-16890"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v3qf-6wju-1bg8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49273?format=json","vulnerability_id":"VCID-v9n1-d6xt-6ubn","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30115.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30115.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-30115","reference_id":"","reference_type":"","scores":[{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27478","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27713","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27658","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.2755","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27925","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27967","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27758","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27826","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27867","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27873","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27831","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27774","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.2778","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27755","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-30115"},{"reference_url":"https://curl.se/docs/CVE-2022-30115.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-30115.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1557449","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/1557449"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082223","reference_id":"2082223","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082223"},{"reference_url":"https://security.archlinux.org/AVG-2706","reference_id":"AVG-2706","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2706"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202212-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582920?format=json","purl":"pkg:deb/debian/curl@7.83.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.83.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2022-30115"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v9n1-d6xt-6ubn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96495?format=json","vulnerability_id":"VCID-vbbv-k1r7-kkas","summary":"When doing SSH-based transfers using either SCP or SFTP, and asked to do public key authentication, curl would wrongly still ask and authenticate using a locally running SSH agent.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-15224.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-15224.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-15224","reference_id":"","reference_type":"","scores":[{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24629","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24338","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.2457","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24526","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.2447","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24485","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24479","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24454","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24395","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.2438","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24667","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24442","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.2451","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24554","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-15224"},{"reference_url":"https://curl.se/docs/CVE-2025-15224.html","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:38:20Z/"}],"url":"https://curl.se/docs/CVE-2025-15224.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15224","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15224"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/3480925","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:38:20Z/"}],"url":"https://hackerone.com/reports/3480925"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426410","reference_id":"2426410","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426410"},{"reference_url":"https://curl.se/docs/CVE-2025-15224.json","reference_id":"CVE-2025-15224.json","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-08T14:38:20Z/"}],"url":"https://curl.se/docs/CVE-2025-15224.json"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6893","reference_id":"RHSA-2026:6893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6893"},{"reference_url":"https://usn.ubuntu.com/8062-1/","reference_id":"USN-8062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8062-1/"},{"reference_url":"https://usn.ubuntu.com/8062-2/","reference_id":"USN-8062-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8062-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/921945?format=json","purl":"pkg:deb/debian/curl@8.18.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.18.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2025-15224"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vbbv-k1r7-kkas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43382?format=json","vulnerability_id":"VCID-vr9x-yqsd-6fc8","summary":"A heap-based buffer overflow in cURL might allow remote attackers\n    to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2486","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2486"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0500.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0500.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-0500","reference_id":"","reference_type":"","scores":[{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78441","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78571","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78461","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78488","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78493","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78518","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78499","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78491","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78519","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78515","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78548","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78554","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78447","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78478","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-0500"},{"reference_url":"https://curl.haxx.se/docs/adv_2018-70a2.html","reference_id":"","reference_type":"","scores":[],"url":"https://curl.haxx.se/docs/adv_2018-70a2.html"},{"reference_url":"https://curl.se/docs/CVE-2018-0500.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2018-0500.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0500","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0500"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/curl/curl/commit/ba1dbd78e5f1ed67c1b8d37ac89d90e5e330b628","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/curl/curl/commit/ba1dbd78e5f1ed67c1b8d37ac89d90e5e330b628"},{"reference_url":"http://www.securitytracker.com/id/1041280","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1041280"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1597101","reference_id":"1597101","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1597101"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903546","reference_id":"903546","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=903546"},{"reference_url":"https://security.archlinux.org/ASA-201807-10","reference_id":"ASA-201807-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201807-10"},{"reference_url":"https://security.archlinux.org/ASA-201807-5","reference_id":"ASA-201807-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201807-5"},{"reference_url":"https://security.archlinux.org/ASA-201807-6","reference_id":"ASA-201807-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201807-6"},{"reference_url":"https://security.archlinux.org/ASA-201807-7","reference_id":"ASA-201807-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201807-7"},{"reference_url":"https://security.archlinux.org/ASA-201807-8","reference_id":"ASA-201807-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201807-8"},{"reference_url":"https://security.archlinux.org/ASA-201807-9","reference_id":"ASA-201807-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201807-9"},{"reference_url":"https://security.archlinux.org/AVG-729","reference_id":"AVG-729","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-729"},{"reference_url":"https://security.archlinux.org/AVG-730","reference_id":"AVG-730","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-730"},{"reference_url":"https://security.archlinux.org/AVG-731","reference_id":"AVG-731","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-731"},{"reference_url":"https://security.archlinux.org/AVG-732","reference_id":"AVG-732","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-732"},{"reference_url":"https://security.archlinux.org/AVG-733","reference_id":"AVG-733","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-733"},{"reference_url":"https://security.archlinux.org/AVG-734","reference_id":"AVG-734","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-734"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-0500","reference_id":"CVE-2018-0500","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-0500"},{"reference_url":"https://security.gentoo.org/glsa/201807-04","reference_id":"GLSA-201807-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201807-04"},{"reference_url":"https://usn.ubuntu.com/3710-1/","reference_id":"USN-3710-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3710-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586696?format=json","purl":"pkg:deb/debian/curl@7.61.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.61.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2018-0500"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vr9x-yqsd-6fc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34696?format=json","vulnerability_id":"VCID-vxpj-xygq-9be2","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8615.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8615.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8615","reference_id":"","reference_type":"","scores":[{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84774","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84871","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84857","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84854","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84849","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.8487","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84789","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84808","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.8481","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84832","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84839","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03112","scoring_system":"epss","scoring_elements":"0.86847","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04231","scoring_system":"epss","scoring_elements":"0.88808","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04231","scoring_system":"epss","scoring_elements":"0.88802","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04231","scoring_system":"epss","scoring_elements":"0.88809","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8615"},{"reference_url":"https://curl.se/docs/CVE-2016-8615.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8615.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037192","reference_id":"1037192","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/"}],"url":"http://www.securitytracker.com/id/1037192"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388370","reference_id":"1388370","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388370"},{"reference_url":"http://www.securityfocus.com/bid/94096","reference_id":"94096","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/"}],"url":"http://www.securityfocus.com/bid/94096"},{"reference_url":"https://curl.haxx.se/docs/adv_20161102A.html","reference_id":"adv_20161102A.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/"}],"url":"https://curl.haxx.se/docs/adv_20161102A.html"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://curl.haxx.se/CVE-2016-8615.patch","reference_id":"CVE-2016-8615.patch","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/"}],"url":"https://curl.haxx.se/CVE-2016-8615.patch"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/"}],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615","reference_id":"show_bug.cgi?id=CVE-2016-8615","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583608?format=json","purl":"pkg:deb/debian/curl@7.51.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-8615"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vxpj-xygq-9be2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34699?format=json","vulnerability_id":"VCID-vyk2-s5ut-ubbz","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8618.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8618.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8618","reference_id":"","reference_type":"","scores":[{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.81967","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82107","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82033","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82068","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82069","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.8207","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82092","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82104","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.81978","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82001","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.81997","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82024","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82031","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82051","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.8204","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8618"},{"reference_url":"https://curl.se/docs/CVE-2016-8618.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8618.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388378","reference_id":"1388378","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388378"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583608?format=json","purl":"pkg:deb/debian/curl@7.51.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-8618"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vyk2-s5ut-ubbz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34394?format=json","vulnerability_id":"VCID-w8ks-xk66-r3fm","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3823.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3823.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3823","reference_id":"","reference_type":"","scores":[{"value":"0.01673","scoring_system":"epss","scoring_elements":"0.82083","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01673","scoring_system":"epss","scoring_elements":"0.82071","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01673","scoring_system":"epss","scoring_elements":"0.82104","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01673","scoring_system":"epss","scoring_elements":"0.821","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01673","scoring_system":"epss","scoring_elements":"0.82126","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01673","scoring_system":"epss","scoring_elements":"0.82134","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01673","scoring_system":"epss","scoring_elements":"0.82153","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01673","scoring_system":"epss","scoring_elements":"0.82144","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01673","scoring_system":"epss","scoring_elements":"0.82137","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01673","scoring_system":"epss","scoring_elements":"0.82175","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01673","scoring_system":"epss","scoring_elements":"0.82178","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01673","scoring_system":"epss","scoring_elements":"0.82201","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01673","scoring_system":"epss","scoring_elements":"0.82212","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01673","scoring_system":"epss","scoring_elements":"0.82215","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-3823"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:04Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3823"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:04Z/"}],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-936080.pdf"},{"reference_url":"https://curl.haxx.se/docs/CVE-2019-3823.html","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:04Z/"}],"url":"https://curl.haxx.se/docs/CVE-2019-3823.html"},{"reference_url":"https://curl.se/docs/CVE-2019-3823.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2019-3823.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3822"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3823"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:04Z/"}],"url":"https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f%40%3Cdevnull.infra.apache.org%3E"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190315-0001/","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:04Z/"}],"url":"https://security.netapp.com/advisory/ntap-20190315-0001/"},{"reference_url":"https://www.debian.org/security/2019/dsa-4386","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:04Z/"}],"url":"https://www.debian.org/security/2019/dsa-4386"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:04Z/"}],"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:04Z/"}],"url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"reference_url":"http://www.securityfocus.com/bid/106950","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:04Z/"}],"url":"http://www.securityfocus.com/bid/106950"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1670256","reference_id":"1670256","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1670256"},{"reference_url":"https://security.archlinux.org/ASA-201902-10","reference_id":"ASA-201902-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201902-10"},{"reference_url":"https://security.archlinux.org/ASA-201902-11","reference_id":"ASA-201902-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201902-11"},{"reference_url":"https://security.archlinux.org/ASA-201902-12","reference_id":"ASA-201902-12","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201902-12"},{"reference_url":"https://security.archlinux.org/ASA-201902-13","reference_id":"ASA-201902-13","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201902-13"},{"reference_url":"https://security.archlinux.org/ASA-201902-9","reference_id":"ASA-201902-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201902-9"},{"reference_url":"https://security.archlinux.org/AVG-873","reference_id":"AVG-873","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-873"},{"reference_url":"https://security.archlinux.org/AVG-874","reference_id":"AVG-874","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-874"},{"reference_url":"https://security.archlinux.org/AVG-875","reference_id":"AVG-875","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-875"},{"reference_url":"https://security.archlinux.org/AVG-876","reference_id":"AVG-876","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-876"},{"reference_url":"https://security.archlinux.org/AVG-877","reference_id":"AVG-877","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-877"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:secure_global_desktop:5.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3823","reference_id":"CVE-2019-3823","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-3823"},{"reference_url":"https://security.gentoo.org/glsa/201903-03","reference_id":"GLSA-201903-03","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:04Z/"}],"url":"https://security.gentoo.org/glsa/201903-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3701","reference_id":"RHSA-2019:3701","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2019:3701"},{"reference_url":"https://usn.ubuntu.com/3882-1/","reference_id":"USN-3882-1","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T20:52:04Z/"}],"url":"https://usn.ubuntu.com/3882-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585517?format=json","purl":"pkg:deb/debian/curl@7.64.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.64.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2019-3823"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w8ks-xk66-r3fm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/161813?format=json","vulnerability_id":"VCID-wc8j-qyp4-tqbd","summary":"Multiple untrusted search path vulnerabilities in cURL and libcurl before 7.49.1, when built with SSPI or telnet is enabled, allow local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) security.dll, (2) secur32.dll, or (3) ws2_32.dll in the application or current working directory.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4802","reference_id":"","reference_type":"","scores":[{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69897","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69885","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69894","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.6974","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69751","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69767","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69743","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69791","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69807","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.6983","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69815","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.698","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69842","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69852","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69833","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4802"},{"reference_url":"https://curl.haxx.se/docs/adv_20160530.html","reference_id":"","reference_type":"","scores":[],"url":"https://curl.haxx.se/docs/adv_20160530.html"},{"reference_url":"https://curl.se/docs/CVE-2016-4802.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-4802.html"},{"reference_url":"http://www.securityfocus.com/bid/90997","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/90997"},{"reference_url":"http://www.securitytracker.com/id/1036008","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036008"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4802","reference_id":"CVE-2016-4802","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4802"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-4802"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wc8j-qyp4-tqbd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84479?format=json","vulnerability_id":"VCID-wdhs-h36p-qbga","summary":"curl: negotiate not treated as connection-oriented (incomplete fix for CVE-2015-3148)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2628.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2628.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2628","reference_id":"","reference_type":"","scores":[{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74503","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74508","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74535","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74509","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74541","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74557","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74579","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.7456","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74552","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.7459","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74597","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74589","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74624","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74631","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74632","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2628"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1422464","reference_id":"1422464","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1422464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0847","reference_id":"RHSA-2017:0847","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0847"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2017-2628"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wdhs-h36p-qbga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72616?format=json","vulnerability_id":"VCID-wgma-bycg-1qb1","summary":"curl: curl netrc password leak","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11053.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11053.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11053","reference_id":"","reference_type":"","scores":[{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76447","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76388","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76366","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76361","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76402","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76408","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76393","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76427","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76433","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76306","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76336","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76315","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76348","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76362","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-11053"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1089682","reference_id":"1089682","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1089682"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331191","reference_id":"2331191","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2331191"},{"reference_url":"https://hackerone.com/reports/2829063","reference_id":"2829063","reference_type":"","scores":[{"value":"3.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-15T16:47:42Z/"}],"url":"https://hackerone.com/reports/2829063"},{"reference_url":"https://curl.se/docs/CVE-2024-11053.html","reference_id":"CVE-2024-11053.html","reference_type":"","scores":[{"value":"3.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-15T16:47:42Z/"}],"url":"https://curl.se/docs/CVE-2024-11053.html"},{"reference_url":"https://curl.se/docs/CVE-2024-11053.json","reference_id":"CVE-2024-11053.json","reference_type":"","scores":[{"value":"3.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-15T16:47:42Z/"}],"url":"https://curl.se/docs/CVE-2024-11053.json"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1671","reference_id":"RHSA-2025:1671","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1671"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:1673","reference_id":"RHSA-2025:1673","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:1673"},{"reference_url":"https://usn.ubuntu.com/7162-1/","reference_id":"USN-7162-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7162-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/586387?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/586388?format=json","purl":"pkg:deb/debian/curl@8.11.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.11.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2024-11053"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wgma-bycg-1qb1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39486?format=json","vulnerability_id":"VCID-wh98-pw9h-cyfx","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which can allow remote attackers to cause Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3145.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3145.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3145","reference_id":"","reference_type":"","scores":[{"value":"0.63704","scoring_system":"epss","scoring_elements":"0.98427","published_at":"2026-04-29T12:55:00Z"},{"value":"0.63704","scoring_system":"epss","scoring_elements":"0.98404","published_at":"2026-04-01T12:55:00Z"},{"value":"0.63704","scoring_system":"epss","scoring_elements":"0.98407","published_at":"2026-04-02T12:55:00Z"},{"value":"0.63704","scoring_system":"epss","scoring_elements":"0.98409","published_at":"2026-04-04T12:55:00Z"},{"value":"0.63704","scoring_system":"epss","scoring_elements":"0.98412","published_at":"2026-04-07T12:55:00Z"},{"value":"0.63704","scoring_system":"epss","scoring_elements":"0.98415","published_at":"2026-04-08T12:55:00Z"},{"value":"0.63704","scoring_system":"epss","scoring_elements":"0.98416","published_at":"2026-04-09T12:55:00Z"},{"value":"0.63704","scoring_system":"epss","scoring_elements":"0.9842","published_at":"2026-04-13T12:55:00Z"},{"value":"0.63704","scoring_system":"epss","scoring_elements":"0.98425","published_at":"2026-04-16T12:55:00Z"},{"value":"0.63704","scoring_system":"epss","scoring_elements":"0.98424","published_at":"2026-04-18T12:55:00Z"},{"value":"0.63704","scoring_system":"epss","scoring_elements":"0.98423","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3145"},{"reference_url":"https://curl.se/docs/CVE-2015-3145.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2015-3145.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3145","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3145"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1213347","reference_id":"1213347","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1213347"},{"reference_url":"https://security.gentoo.org/glsa/201509-02","reference_id":"GLSA-201509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201509-02"},{"reference_url":"https://usn.ubuntu.com/2591-1/","reference_id":"USN-2591-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2591-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586640?format=json","purl":"pkg:deb/debian/curl@7.42.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.42.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2015-3145"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wh98-pw9h-cyfx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59717?format=json","vulnerability_id":"VCID-wrh2-77dv-hbdz","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3558","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:59:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:3558"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8817.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8817.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8817","reference_id":"","reference_type":"","scores":[{"value":"0.00745","scoring_system":"epss","scoring_elements":"0.7309","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00745","scoring_system":"epss","scoring_elements":"0.73097","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00766","scoring_system":"epss","scoring_elements":"0.73545","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00766","scoring_system":"epss","scoring_elements":"0.73534","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00766","scoring_system":"epss","scoring_elements":"0.73543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00852","scoring_system":"epss","scoring_elements":"0.74918","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00852","scoring_system":"epss","scoring_elements":"0.74919","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00852","scoring_system":"epss","scoring_elements":"0.74872","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00852","scoring_system":"epss","scoring_elements":"0.74905","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00852","scoring_system":"epss","scoring_elements":"0.74941","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00852","scoring_system":"epss","scoring_elements":"0.7491","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76291","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76294","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00949","scoring_system":"epss","scoring_elements":"0.76325","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00981","scoring_system":"epss","scoring_elements":"0.76812","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-8817"},{"reference_url":"https://curl.haxx.se/docs/adv_2017-ae72.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:59:34Z/"}],"url":"https://curl.haxx.se/docs/adv_2017-ae72.html"},{"reference_url":"https://curl.se/docs/CVE-2017-8817.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2017-8817.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8817"},{"reference_url":"http://security.cucumberlinux.com/security/details.php?id=162","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:59:34Z/"}],"url":"http://security.cucumberlinux.com/security/details.php?id=162"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:N"},{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:59:34Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2017/11/msg00040.html"},{"reference_url":"https://www.debian.org/security/2017/dsa-4051","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:59:34Z/"}],"url":"https://www.debian.org/security/2017/dsa-4051"},{"reference_url":"http://www.securityfocus.com/bid/102057","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:59:34Z/"}],"url":"http://www.securityfocus.com/bid/102057"},{"reference_url":"http://www.securitytracker.com/id/1039897","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:59:34Z/"}],"url":"http://www.securitytracker.com/id/1039897"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1515760","reference_id":"1515760","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1515760"},{"reference_url":"https://security.archlinux.org/ASA-201711-33","reference_id":"ASA-201711-33","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-33"},{"reference_url":"https://security.archlinux.org/ASA-201711-34","reference_id":"ASA-201711-34","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-34"},{"reference_url":"https://security.archlinux.org/ASA-201711-35","reference_id":"ASA-201711-35","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-35"},{"reference_url":"https://security.archlinux.org/ASA-201711-36","reference_id":"ASA-201711-36","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-36"},{"reference_url":"https://security.archlinux.org/ASA-201711-37","reference_id":"ASA-201711-37","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-37"},{"reference_url":"https://security.archlinux.org/ASA-201711-38","reference_id":"ASA-201711-38","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-38"},{"reference_url":"https://security.archlinux.org/AVG-521","reference_id":"AVG-521","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-521"},{"reference_url":"https://security.archlinux.org/AVG-522","reference_id":"AVG-522","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-522"},{"reference_url":"https://security.archlinux.org/AVG-523","reference_id":"AVG-523","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-523"},{"reference_url":"https://security.archlinux.org/AVG-524","reference_id":"AVG-524","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-524"},{"reference_url":"https://security.archlinux.org/AVG-525","reference_id":"AVG-525","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-525"},{"reference_url":"https://security.archlinux.org/AVG-526","reference_id":"AVG-526","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-526"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8817","reference_id":"CVE-2017-8817","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-8817"},{"reference_url":"https://security.gentoo.org/glsa/201712-04","reference_id":"GLSA-201712-04","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:59:34Z/"}],"url":"https://security.gentoo.org/glsa/201712-04"},{"reference_url":"https://usn.ubuntu.com/3498-1/","reference_id":"USN-3498-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3498-1/"},{"reference_url":"https://usn.ubuntu.com/3498-2/","reference_id":"USN-3498-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3498-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585790?format=json","purl":"pkg:deb/debian/curl@7.57.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.57.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2017-8817"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wrh2-77dv-hbdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47225?format=json","vulnerability_id":"VCID-wwam-tcmv-kqhc","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which may lead to arbitrary code execution.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00048.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00055.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5482.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5482.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5482","reference_id":"","reference_type":"","scores":[{"value":"0.06912","scoring_system":"epss","scoring_elements":"0.91402","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06912","scoring_system":"epss","scoring_elements":"0.91423","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06912","scoring_system":"epss","scoring_elements":"0.91424","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06912","scoring_system":"epss","scoring_elements":"0.91403","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06912","scoring_system":"epss","scoring_elements":"0.91427","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07088","scoring_system":"epss","scoring_elements":"0.91547","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07088","scoring_system":"epss","scoring_elements":"0.91549","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07088","scoring_system":"epss","scoring_elements":"0.91546","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08332","scoring_system":"epss","scoring_elements":"0.92277","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08332","scoring_system":"epss","scoring_elements":"0.92281","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08332","scoring_system":"epss","scoring_elements":"0.92286","published_at":"2026-04-11T12:55:00Z"},{"value":"0.08332","scoring_system":"epss","scoring_elements":"0.92262","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08332","scoring_system":"epss","scoring_elements":"0.92257","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08332","scoring_system":"epss","scoring_elements":"0.9225","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08332","scoring_system":"epss","scoring_elements":"0.92265","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5482"},{"reference_url":"https://curl.haxx.se/docs/CVE-2019-5482.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"}],"url":"https://curl.haxx.se/docs/CVE-2019-5482.html"},{"reference_url":"https://curl.se/docs/CVE-2019-5482.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2019-5482.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/684603","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/684603"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6CI4QQ2RSZX4VCFM76SIWGKY6BY7UWIC/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGDVKSLY5JUNJRLYRUA6CXGQ2LM63XC3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UA7KDM2WPM5CJDDGOEGFV6SSGD2J7RNT/"},{"reference_url":"https://seclists.org/bugtraq/2020/Feb/36","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"}],"url":"https://seclists.org/bugtraq/2020/Feb/36"},{"reference_url":"https://security.netapp.com/advisory/ntap-20191004-0003/","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"}],"url":"https://security.netapp.com/advisory/ntap-20191004-0003/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20200416-0003/","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"}],"url":"https://security.netapp.com/advisory/ntap-20200416-0003/"},{"reference_url":"https://www.debian.org/security/2020/dsa-4633","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"}],"url":"https://www.debian.org/security/2020/dsa-4633"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2020.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpujan2020.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"}],"url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpuoct2020.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"}],"url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1749652","reference_id":"1749652","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1749652"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940010","reference_id":"940010","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940010"},{"reference_url":"https://security.archlinux.org/AVG-1982","reference_id":"AVG-1982","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1982"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_operations_monitor:4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_operations_monitor:4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_session_border_controller:8.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:http_server:12.2.1.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_essbase:11.1.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:hyperion_essbase:11.1.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:hyperion_essbase:11.1.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:oss_support_tools:20.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:oss_support_tools:20.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:oss_support_tools:20.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-5482","reference_id":"CVE-2019-5482","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-5482"},{"reference_url":"https://security.gentoo.org/glsa/202003-29","reference_id":"GLSA-202003-29","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-15T20:55:46Z/"}],"url":"https://security.gentoo.org/glsa/202003-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0250","reference_id":"RHSA-2020:0250","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0250"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1792","reference_id":"RHSA-2020:1792","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1792"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3916","reference_id":"RHSA-2020:3916","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3916"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0759","reference_id":"RHSA-2021:0759","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0759"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0877","reference_id":"RHSA-2021:0877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0877"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0949","reference_id":"RHSA-2021:0949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1027","reference_id":"RHSA-2021:1027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1027"},{"reference_url":"https://usn.ubuntu.com/4129-1/","reference_id":"USN-4129-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4129-1/"},{"reference_url":"https://usn.ubuntu.com/4129-2/","reference_id":"USN-4129-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4129-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585101?format=json","purl":"pkg:deb/debian/curl@7.66.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.66.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2019-5482"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wwam-tcmv-kqhc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96485?format=json","vulnerability_id":"VCID-x57x-w8g8-7ybz","summary":"When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP, POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new target host.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14524.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14524.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-14524","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07128","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07226","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07206","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07237","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07234","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07222","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07212","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0715","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07127","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07251","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07177","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07151","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-14524"},{"reference_url":"https://curl.se/docs/CVE-2025-14524.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T19:24:54Z/"}],"url":"https://curl.se/docs/CVE-2025-14524.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14524"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/3459417","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T19:24:54Z/"}],"url":"https://hackerone.com/reports/3459417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426407","reference_id":"2426407","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2426407"},{"reference_url":"https://curl.se/docs/CVE-2025-14524.json","reference_id":"CVE-2025-14524.json","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T19:24:54Z/"}],"url":"https://curl.se/docs/CVE-2025-14524.json"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6893","reference_id":"RHSA-2026:6893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6893"},{"reference_url":"https://usn.ubuntu.com/8062-1/","reference_id":"USN-8062-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8062-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/921943?format=json","purl":"pkg:deb/debian/curl@8.18.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.18.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2025-14524"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x57x-w8g8-7ybz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60271?format=json","vulnerability_id":"VCID-xkw8-ptjd-sfb6","summary":"libcurl is affected by a buffer overflow in the handling of URLs for the\n    TFTP protocol, which could be exploited to compromise a user's system.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1061","reference_id":"","reference_type":"","scores":[{"value":"0.03827","scoring_system":"epss","scoring_elements":"0.88176","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03827","scoring_system":"epss","scoring_elements":"0.88083","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03827","scoring_system":"epss","scoring_elements":"0.88092","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03827","scoring_system":"epss","scoring_elements":"0.88108","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03827","scoring_system":"epss","scoring_elements":"0.88114","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03827","scoring_system":"epss","scoring_elements":"0.88133","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03827","scoring_system":"epss","scoring_elements":"0.88139","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03827","scoring_system":"epss","scoring_elements":"0.88148","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03827","scoring_system":"epss","scoring_elements":"0.88141","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03827","scoring_system":"epss","scoring_elements":"0.88143","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03827","scoring_system":"epss","scoring_elements":"0.88156","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03827","scoring_system":"epss","scoring_elements":"0.88154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03827","scoring_system":"epss","scoring_elements":"0.88171","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03827","scoring_system":"epss","scoring_elements":"0.88177","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1061"},{"reference_url":"https://curl.se/docs/CVE-2006-1061.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2006-1061.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1061","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1061"},{"reference_url":"https://security.gentoo.org/glsa/200603-19","reference_id":"GLSA-200603-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200603-19"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585374?format=json","purl":"pkg:deb/debian/curl@7.15.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.15.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2006-1061"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xkw8-ptjd-sfb6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90471?format=json","vulnerability_id":"VCID-xm7g-6w3z-37fs","summary":"libcurl 7.14.0 through 7.16.3, when built with GnuTLS support, does not check SSL/TLS certificate expiration or activation dates, which allows remote attackers to bypass certain access restrictions.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3564.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3564.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3564","reference_id":"","reference_type":"","scores":[{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70482","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70329","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70341","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70358","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70336","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70381","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70396","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.7042","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70405","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.7039","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70433","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70442","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70422","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70472","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00635","scoring_system":"epss","scoring_elements":"0.70481","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3564"},{"reference_url":"https://curl.se/docs/CVE-2007-3564.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2007-3564.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3564","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3564"},{"reference_url":"https://usn.ubuntu.com/484-1/","reference_id":"USN-484-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/484-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583968?format=json","purl":"pkg:deb/debian/curl@7.16.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.16.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2007-3564"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xm7g-6w3z-37fs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57258?format=json","vulnerability_id":"VCID-xpss-yndr-mycj","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43551.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-43551.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-43551","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12972","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12923","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12773","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12902","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12868","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12831","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12786","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1269","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12697","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12798","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12819","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15055","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15114","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-43551"},{"reference_url":"https://curl.se/docs/CVE-2022-43551.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-43551.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43551"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1755083","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-15T14:38:16Z/"}],"url":"https://hackerone.com/reports/1755083"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026829","reference_id":"1026829","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1026829"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2152639","reference_id":"2152639","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2152639"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-15T14:38:16Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-15T14:38:16Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3354","reference_id":"RHSA-2023:3354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3354"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3355","reference_id":"RHSA-2023:3355","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3355"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVWZW5CNSJ7UYAF2BGSYAWAEXDJYUBHA/","reference_id":"TVWZW5CNSJ7UYAF2BGSYAWAEXDJYUBHA","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-08-15T14:38:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVWZW5CNSJ7UYAF2BGSYAWAEXDJYUBHA/"},{"reference_url":"https://usn.ubuntu.com/5788-1/","reference_id":"USN-5788-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5788-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/584156?format=json","purl":"pkg:deb/debian/curl@7.86.0-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.86.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2022-43551"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xpss-yndr-mycj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39484?format=json","vulnerability_id":"VCID-xspf-45t1-2uhf","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which can allow remote attackers to cause Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3143.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3143.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3143","reference_id":"","reference_type":"","scores":[{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87591","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.875","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.8751","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87524","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87526","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87545","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87552","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87563","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87559","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87556","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.8757","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87571","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87569","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87586","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87593","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3143"},{"reference_url":"https://curl.se/docs/CVE-2015-3143.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2015-3143.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1213306","reference_id":"1213306","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1213306"},{"reference_url":"https://security.gentoo.org/glsa/201509-02","reference_id":"GLSA-201509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201509-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1254","reference_id":"RHSA-2015:1254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1254"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2159","reference_id":"RHSA-2015:2159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2159"},{"reference_url":"https://usn.ubuntu.com/2591-1/","reference_id":"USN-2591-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2591-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/586640?format=json","purl":"pkg:deb/debian/curl@7.42.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.42.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2015-3143"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xspf-45t1-2uhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49275?format=json","vulnerability_id":"VCID-xzay-sjpy-3yce","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32206.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32206","reference_id":"","reference_type":"","scores":[{"value":"0.03973","scoring_system":"epss","scoring_elements":"0.88424","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03973","scoring_system":"epss","scoring_elements":"0.88423","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04546","scoring_system":"epss","scoring_elements":"0.89161","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04546","scoring_system":"epss","scoring_elements":"0.89143","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04546","scoring_system":"epss","scoring_elements":"0.89158","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04546","scoring_system":"epss","scoring_elements":"0.89212","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04546","scoring_system":"epss","scoring_elements":"0.89195","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04546","scoring_system":"epss","scoring_elements":"0.89199","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04546","scoring_system":"epss","scoring_elements":"0.892","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04546","scoring_system":"epss","scoring_elements":"0.89187","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04546","scoring_system":"epss","scoring_elements":"0.89189","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04546","scoring_system":"epss","scoring_elements":"0.89193","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04546","scoring_system":"epss","scoring_elements":"0.89183","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04546","scoring_system":"epss","scoring_elements":"0.89178","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32206"},{"reference_url":"https://curl.se/docs/CVE-2022-32206.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-32206.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1570651","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"}],"url":"https://hackerone.com/reports/1570651"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2099300","reference_id":"2099300","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2099300"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Oct/28","reference_id":"28","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Oct/28"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/02/15/3","reference_id":"3","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/02/15/3"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Oct/41","reference_id":"41","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Oct/41"},{"reference_url":"https://security.archlinux.org/AVG-2817","reference_id":"AVG-2817","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2817"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/","reference_id":"BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/"},{"reference_url":"https://www.debian.org/security/2022/dsa-5197","reference_id":"dsa-5197","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"}],"url":"https://www.debian.org/security/2022/dsa-5197"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://support.apple.com/kb/HT213488","reference_id":"HT213488","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"}],"url":"https://support.apple.com/kb/HT213488"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220915-0003/","reference_id":"ntap-20220915-0003","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:52Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220915-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6157","reference_id":"RHSA-2022:6157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6159","reference_id":"RHSA-2022:6159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6159"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8840","reference_id":"RHSA-2022:8840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8841","reference_id":"RHSA-2022:8841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3460","reference_id":"RHSA-2023:3460","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3460"},{"reference_url":"https://usn.ubuntu.com/5495-1/","reference_id":"USN-5495-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5495-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582658?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583413?format=json","purl":"pkg:deb/debian/curl@7.84.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.84.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2022-32206"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xzay-sjpy-3yce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/11000?format=json","vulnerability_id":"VCID-y32p-52ps-4ug4","summary":"Use of Incorrectly-Resolved Name or Reference\nlibcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function does not take `issuercert` into account and it compared the involved paths *case insensitively*, which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn't include the `issuer cert` which a transfer can set to qualify how to verify the server certificate.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22924.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22924.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22924","reference_id":"","reference_type":"","scores":[{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73012","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73042","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.7316","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73161","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73147","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.7311","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73117","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73107","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73016","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73021","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73053","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73066","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73064","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73091","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.7307","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22924"},{"reference_url":"https://curl.se/docs/CVE-2021-22924.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2021-22924.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1223565","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://hackerone.com/reports/1223565"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1981460","reference_id":"1981460","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1981460"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991492","reference_id":"991492","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991492"},{"reference_url":"https://security.archlinux.org/ASA-202107-59","reference_id":"ASA-202107-59","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-59"},{"reference_url":"https://security.archlinux.org/ASA-202107-60","reference_id":"ASA-202107-60","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-60"},{"reference_url":"https://security.archlinux.org/ASA-202107-61","reference_id":"ASA-202107-61","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-61"},{"reference_url":"https://security.archlinux.org/ASA-202107-62","reference_id":"ASA-202107-62","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-62"},{"reference_url":"https://security.archlinux.org/ASA-202107-63","reference_id":"ASA-202107-63","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-63"},{"reference_url":"https://security.archlinux.org/ASA-202107-64","reference_id":"ASA-202107-64","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-64"},{"reference_url":"https://security.archlinux.org/AVG-2194","reference_id":"AVG-2194","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2194"},{"reference_url":"https://security.archlinux.org/AVG-2195","reference_id":"AVG-2195","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2195"},{"reference_url":"https://security.archlinux.org/AVG-2196","reference_id":"AVG-2196","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2196"},{"reference_url":"https://security.archlinux.org/AVG-2197","reference_id":"AVG-2197","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2197"},{"reference_url":"https://security.archlinux.org/AVG-2198","reference_id":"AVG-2198","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2198"},{"reference_url":"https://security.archlinux.org/AVG-2199","reference_id":"AVG-2199","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2199"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22924","reference_id":"CVE-2021-22924","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22924"},{"reference_url":"https://www.debian.org/security/2022/dsa-5197","reference_id":"dsa-5197","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://www.debian.org/security/2022/dsa-5197"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/","reference_id":"FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210902-0003/","reference_id":"ntap-20210902-0003","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210902-0003/"},{"reference_url":"https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E","reference_id":"r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E","reference_id":"r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E","reference_id":"rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E","reference_id":"rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3582","reference_id":"RHSA-2021:3582","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3582"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1354","reference_id":"RHSA-2022:1354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1354"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf","reference_id":"ssa-484086.pdf","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf","reference_id":"ssa-732250.pdf","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf"},{"reference_url":"https://usn.ubuntu.com/5021-1/","reference_id":"USN-5021-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5021-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582658?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584001?format=json","purl":"pkg:deb/debian/curl@7.79.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.79.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2021-22924"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y32p-52ps-4ug4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49277?format=json","vulnerability_id":"VCID-y4x5-n5m2-x7bq","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32208.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32208","reference_id":"","reference_type":"","scores":[{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33706","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34188","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33815","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33792","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37942","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37916","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.3787","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37819","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37863","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37884","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37837","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37862","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37898","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37883","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32208"},{"reference_url":"https://curl.se/docs/CVE-2022-32208.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-32208.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1590071","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"}],"url":"https://hackerone.com/reports/1590071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2099306","reference_id":"2099306","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2099306"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Oct/28","reference_id":"28","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Oct/28"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Oct/41","reference_id":"41","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Oct/41"},{"reference_url":"https://security.archlinux.org/AVG-2817","reference_id":"AVG-2817","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2817"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/","reference_id":"BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/"},{"reference_url":"https://www.debian.org/security/2022/dsa-5197","reference_id":"dsa-5197","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"}],"url":"https://www.debian.org/security/2022/dsa-5197"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://support.apple.com/kb/HT213488","reference_id":"HT213488","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"}],"url":"https://support.apple.com/kb/HT213488"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220915-0003/","reference_id":"ntap-20220915-0003","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:50Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220915-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6157","reference_id":"RHSA-2022:6157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6159","reference_id":"RHSA-2022:6159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6159"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8840","reference_id":"RHSA-2022:8840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8841","reference_id":"RHSA-2022:8841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8841"},{"reference_url":"https://usn.ubuntu.com/5495-1/","reference_id":"USN-5495-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5495-1/"},{"reference_url":"https://usn.ubuntu.com/5499-1/","reference_id":"USN-5499-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5499-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582658?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/583413?format=json","purl":"pkg:deb/debian/curl@7.84.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.84.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2022-32208"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y4x5-n5m2-x7bq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/147275?format=json","vulnerability_id":"VCID-ya9y-nav3-37hh","summary":"curl and libcurl 7.27.0 through 7.35.0, when using the SecureTransport/Darwinssl backend, as used in in Apple OS X 10.9.x before 10.9.2, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate when accessing a URL that uses a numerical IP address, which allows man-in-the-middle attackers to spoof servers via an arbitrary valid certificate.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1263","reference_id":"","reference_type":"","scores":[{"value":"0.05846","scoring_system":"epss","scoring_elements":"0.90572","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05846","scoring_system":"epss","scoring_elements":"0.90504","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05846","scoring_system":"epss","scoring_elements":"0.90508","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05846","scoring_system":"epss","scoring_elements":"0.90519","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05846","scoring_system":"epss","scoring_elements":"0.90525","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05846","scoring_system":"epss","scoring_elements":"0.90538","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05846","scoring_system":"epss","scoring_elements":"0.90544","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05846","scoring_system":"epss","scoring_elements":"0.90552","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05846","scoring_system":"epss","scoring_elements":"0.90546","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05846","scoring_system":"epss","scoring_elements":"0.90563","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05846","scoring_system":"epss","scoring_elements":"0.90562","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05846","scoring_system":"epss","scoring_elements":"0.90576","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05846","scoring_system":"epss","scoring_elements":"0.90577","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-1263"},{"reference_url":"https://curl.se/docs/CVE-2014-1263.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2014-1263.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582846?format=json","purl":"pkg:deb/debian/curl@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2014-1263"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ya9y-nav3-37hh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49282?format=json","vulnerability_id":"VCID-yaas-j3qk-kfdg","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42916.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42916.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42916","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14603","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14637","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14669","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14667","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25934","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26017","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26063","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26053","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26002","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25945","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25964","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25958","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31155","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31202","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-42916"},{"reference_url":"https://curl.se/docs/CVE-2022-42916.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"}],"url":"https://curl.se/docs/CVE-2022-42916.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42916","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42916"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1730660","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/1730660"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/12/21/1","reference_id":"1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/12/21/1"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jan/19","reference_id":"19","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jan/19"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jan/20","reference_id":"20","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jan/20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2135416","reference_id":"2135416","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2135416"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/","reference_id":"37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://support.apple.com/kb/HT213604","reference_id":"HT213604","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"}],"url":"https://support.apple.com/kb/HT213604"},{"reference_url":"https://support.apple.com/kb/HT213605","reference_id":"HT213605","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"}],"url":"https://support.apple.com/kb/HT213605"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/","reference_id":"HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221209-0010/","reference_id":"ntap-20221209-0010","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221209-0010/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/","reference_id":"Q27V5YYMXUVI6PRZQVECON32XPVWTKDK","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-20T16:06:47Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8840","reference_id":"RHSA-2022:8840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8841","reference_id":"RHSA-2022:8841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8841"},{"reference_url":"https://usn.ubuntu.com/5702-1/","reference_id":"USN-5702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583300?format=json","purl":"pkg:deb/debian/curl@7.86.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.86.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2022-42916"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yaas-j3qk-kfdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/354621?format=json","vulnerability_id":"VCID-ydcp-ufa5-rqhd","summary":"","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-6429.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-6429.json"},{"reference_url":"https://curl.se/docs/CVE-2026-6429.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2026-6429.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6429","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6429"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/3677759","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/3677759"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2461205","reference_id":"2461205","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2461205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:12916","reference_id":"RHSA-2026:12916","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:12916"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2026-6429"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ydcp-ufa5-rqhd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39488?format=json","vulnerability_id":"VCID-yubp-g4rt-c3e6","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which can allow remote attackers to cause Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3236.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3236.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3236","reference_id":"","reference_type":"","scores":[{"value":"0.04525","scoring_system":"epss","scoring_elements":"0.89199","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04525","scoring_system":"epss","scoring_elements":"0.89112","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04525","scoring_system":"epss","scoring_elements":"0.89119","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04525","scoring_system":"epss","scoring_elements":"0.89134","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04525","scoring_system":"epss","scoring_elements":"0.89137","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04525","scoring_system":"epss","scoring_elements":"0.89155","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04525","scoring_system":"epss","scoring_elements":"0.8916","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04525","scoring_system":"epss","scoring_elements":"0.8917","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04525","scoring_system":"epss","scoring_elements":"0.89166","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04525","scoring_system":"epss","scoring_elements":"0.89164","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04525","scoring_system":"epss","scoring_elements":"0.89176","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04525","scoring_system":"epss","scoring_elements":"0.89173","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04525","scoring_system":"epss","scoring_elements":"0.8919","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04525","scoring_system":"epss","scoring_elements":"0.89195","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3236"},{"reference_url":"https://curl.se/docs/CVE-2015-3236.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2015-3236.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3236","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3236"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1233816","reference_id":"1233816","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1233816"},{"reference_url":"https://security.gentoo.org/glsa/201509-02","reference_id":"GLSA-201509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201509-02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583844?format=json","purl":"pkg:deb/debian/curl@7.43.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.43.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2015-3236"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yubp-g4rt-c3e6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50086?format=json","vulnerability_id":"VCID-yvdd-ataf-ckf1","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in information disclosure or data loss.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8231.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8231.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8231","reference_id":"","reference_type":"","scores":[{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36422","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36823","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36798","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36844","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36827","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36769","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36542","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36511","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44858","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44761","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44855","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44875","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44841","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44863","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44803","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8231"},{"reference_url":"https://curl.se/docs/CVE-2020-8231.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2020-8231.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/948876","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/948876"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1868032","reference_id":"1868032","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1868032"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968831","reference_id":"968831","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968831"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8231","reference_id":"CVE-2020-8231","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-8231"},{"reference_url":"https://security.gentoo.org/glsa/202012-14","reference_id":"GLSA-202012-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202012-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1610","reference_id":"RHSA-2021:1610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1610"},{"reference_url":"https://usn.ubuntu.com/4466-1/","reference_id":"USN-4466-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4466-1/"},{"reference_url":"https://usn.ubuntu.com/4466-2/","reference_id":"USN-4466-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4466-2/"},{"reference_url":"https://usn.ubuntu.com/4665-1/","reference_id":"USN-4665-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4665-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583866?format=json","purl":"pkg:deb/debian/curl@7.72.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.72.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2020-8231"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yvdd-ataf-ckf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34706?format=json","vulnerability_id":"VCID-yxks-8529-23bj","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8625.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8625.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8625","reference_id":"","reference_type":"","scores":[{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81219","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81356","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81278","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81283","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81304","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.8129","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.8132","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81322","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81344","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81351","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81228","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81251","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.8125","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8625"},{"reference_url":"https://curl.se/docs/CVE-2016-8625.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8625.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388392","reference_id":"1388392","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388392"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583608?format=json","purl":"pkg:deb/debian/curl@7.51.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-8625"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yxks-8529-23bj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41496?format=json","vulnerability_id":"VCID-z49y-v1gh-h7gj","summary":"Multiple vulnerabilities have been found in cURL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2174.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2174.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2174","reference_id":"","reference_type":"","scores":[{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.87008","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86912","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86923","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86942","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86936","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86956","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86963","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86977","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86971","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86966","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86981","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86985","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86983","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.87001","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.87006","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2174"},{"reference_url":"https://curl.se/docs/CVE-2013-2174.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2013-2174.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=965640","reference_id":"965640","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=965640"},{"reference_url":"https://security.gentoo.org/glsa/201401-14","reference_id":"GLSA-201401-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0983","reference_id":"RHSA-2013:0983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0983"},{"reference_url":"https://usn.ubuntu.com/1894-1/","reference_id":"USN-1894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1894-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582362?format=json","purl":"pkg:deb/debian/curl@7.31.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.31.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2013-2174"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z49y-v1gh-h7gj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51946?format=json","vulnerability_id":"VCID-z8h3-fdj8-xuaa","summary":"Multiple vulnerabilities have been discovered in cURL, the worst of\n    which could lead to man-in-the-middle attacks.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0138.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0138.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0138","reference_id":"","reference_type":"","scores":[{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71563","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71431","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71439","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71457","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71471","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71483","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71506","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.7149","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71472","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71517","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71522","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71501","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71551","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71559","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0138"},{"reference_url":"https://curl.se/docs/CVE-2014-0138.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2014-0138.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1079148","reference_id":"1079148","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1079148"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742728","reference_id":"742728","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742728"},{"reference_url":"https://security.gentoo.org/glsa/201406-21","reference_id":"GLSA-201406-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0561","reference_id":"RHSA-2014:0561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0561"},{"reference_url":"https://usn.ubuntu.com/2167-1/","reference_id":"USN-2167-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2167-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/585465?format=json","purl":"pkg:deb/debian/curl@7.36.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.36.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2014-0138"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z8h3-fdj8-xuaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34698?format=json","vulnerability_id":"VCID-zxz2-xfpd-pbay","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8617.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8617.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8617","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19575","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19573","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19491","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19517","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19482","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19714","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19763","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19488","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19567","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19619","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19623","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23949","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24209","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24262","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24248","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8617"},{"reference_url":"https://curl.se/docs/CVE-2016-8617.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8617.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037192","reference_id":"1037192","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/"}],"url":"http://www.securitytracker.com/id/1037192"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388377","reference_id":"1388377","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388377"},{"reference_url":"http://www.securityfocus.com/bid/94097","reference_id":"94097","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/"}],"url":"http://www.securityfocus.com/bid/94097"},{"reference_url":"https://curl.haxx.se/docs/adv_20161102C.html","reference_id":"adv_20161102C.html","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/"}],"url":"https://curl.haxx.se/docs/adv_20161102C.html"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://curl.haxx.se/CVE-2016-8617.patch","reference_id":"CVE-2016-8617.patch","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/"}],"url":"https://curl.haxx.se/CVE-2016-8617.patch"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/"}],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617","reference_id":"show_bug.cgi?id=CVE-2016-8617","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/583608?format=json","purl":"pkg:deb/debian/curl@7.51.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.51.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582363?format=json","purl":"pkg:deb/debian/curl@7.74.0-1.3%2Bdeb11u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.74.0-1.3%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582364?format=json","purl":"pkg:deb/debian/curl@7.88.1-10%2Bdeb12u14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2szj-xvgq-pkfr"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@7.88.1-10%252Bdeb12u14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582365?format=json","purl":"pkg:deb/debian/curl@8.14.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-amgy-dw6h-6ydf"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.14.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582366?format=json","purl":"pkg:deb/debian/curl@8.19.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582367?format=json","purl":"pkg:deb/debian/curl@8.19.0-3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.19.0-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1067521?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1077418?format=json","purl":"pkg:deb/debian/curl@8.20.0~rc3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0~rc3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088654?format=json","purl":"pkg:deb/debian/curl@8.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}],"aliases":["CVE-2016-8617"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zxz2-xfpd-pbay"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/curl@8.20.0-1%3Fdistro=trixie"}