{"url":"http://public2.vulnerablecode.io/api/packages/370701?format=json","purl":"pkg:generic/curl.se/curl@7.12.2","type":"generic","namespace":"curl.se","name":"curl","version":"7.12.2","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"8.20.0","latest_non_vulnerable_version":"8.20.0","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49715?format=json","vulnerability_id":"VCID-26ju-84rx-c7b9","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow attackers to bypass intended restrictions.","references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3558","reference_id":"","reference_type":"","scores":[{"value":"2.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:44:34Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:3558"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7407.json","reference_id":"","reference_type":"","scores":[{"value":"2.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7407.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7407","reference_id":"","reference_type":"","scores":[{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51162","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51184","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51563","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.5156","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51604","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51583","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51572","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51472","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51523","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51549","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51509","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51614","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51849","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51811","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00285","scoring_system":"epss","scoring_elements":"0.51854","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7407"},{"reference_url":"https://curl.se/docs/CVE-2017-7407.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2017-7407.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7407"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:S/C:P/I:N/A:N"},{"value":"2.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13","reference_id":"","reference_type":"","scores":[{"value":"2.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:44:34Z/"}],"url":"https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","reference_id":"","reference_type":"","scores":[{"value":"2.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:44:34Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1439190","reference_id":"1439190","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1439190"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859500","reference_id":"859500","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859500"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.53.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7407","reference_id":"CVE-2017-7407","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"},{"value":"2.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7407"},{"reference_url":"https://security.gentoo.org/glsa/201709-14","reference_id":"GLSA-201709-14","reference_type":"","scores":[{"value":"2.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:44:34Z/"}],"url":"https://security.gentoo.org/glsa/201709-14"},{"reference_url":"https://usn.ubuntu.com/3441-1/","reference_id":"USN-3441-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3441-1/"},{"reference_url":"https://usn.ubuntu.com/3441-2/","reference_id":"USN-3441-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3441-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370785?format=json","purl":"pkg:generic/curl.se/curl@7.54.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dhrf-2sz5-3bhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-u9jp-j1ds-73e7"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.54.0"}],"aliases":["CVE-2017-7407"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-26ju-84rx-c7b9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64301?format=json","vulnerability_id":"VCID-2cx5-1qnw-uufj","summary":"curl: curl: Authentication bypass due to incorrect connection reuse with Negotiate authentication","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1965.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1965.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-1965","reference_id":"","reference_type":"","scores":[{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16891","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17194","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17246","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16802","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16949","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16923","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19223","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19246","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19144","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19232","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19134","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19092","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19316","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19261","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-1965"},{"reference_url":"https://curl.se/docs/CVE-2026-1965.html","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:31:56Z/"}],"url":"https://curl.se/docs/CVE-2026-1965.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1965","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1965"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2446448","reference_id":"2446448","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2446448"},{"reference_url":"https://curl.se/docs/CVE-2026-1965.json","reference_id":"CVE-2026-1965.json","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T14:31:56Z/"}],"url":"https://curl.se/docs/CVE-2026-1965.json"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6893","reference_id":"RHSA-2026:6893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6893"},{"reference_url":"https://usn.ubuntu.com/8084-1/","reference_id":"USN-8084-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8084-1/"},{"reference_url":"https://usn.ubuntu.com/8099-1/","reference_id":"USN-8099-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8099-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370671?format=json","purl":"pkg:generic/curl.se/curl@8.19.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-acd8-mwm2-zka5"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.19.0"}],"aliases":["CVE-2026-1965"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2cx5-1qnw-uufj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60689?format=json","vulnerability_id":"VCID-2f5z-vxsz-yqdv","summary":"A vulnerability in cURL may allow for arbitrary file access.","references":[{"reference_url":"http://curl.haxx.se/docs/adv_20090303.html","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/docs/adv_20090303.html"},{"reference_url":"http://curl.haxx.se/lxr/source/CHANGES","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/lxr/source/CHANGES"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html"},{"reference_url":"http://lists.vmware.com/pipermail/security-announce/2009/000060.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.vmware.com/pipermail/security-announce/2009/000060.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0037.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0037.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0037","reference_id":"","reference_type":"","scores":[{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.92823","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.9286","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.92861","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.92865","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.92872","published_at":"2026-04-24T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.9283","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.92834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.92832","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.92841","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.92845","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09542","scoring_system":"epss","scoring_elements":"0.9285","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10036","scoring_system":"epss","scoring_elements":"0.93092","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10036","scoring_system":"epss","scoring_elements":"0.93089","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0037"},{"reference_url":"https://curl.se/docs/CVE-2009-0037.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2009-0037.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037"},{"reference_url":"http://secunia.com/advisories/34138","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34138"},{"reference_url":"http://secunia.com/advisories/34202","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34202"},{"reference_url":"http://secunia.com/advisories/34237","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34237"},{"reference_url":"http://secunia.com/advisories/34251","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34251"},{"reference_url":"http://secunia.com/advisories/34255","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34255"},{"reference_url":"http://secunia.com/advisories/34259","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34259"},{"reference_url":"http://secunia.com/advisories/34399","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34399"},{"reference_url":"http://secunia.com/advisories/35766","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35766"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200903-21.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200903-21.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/49030","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/49030"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.476602","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.476602"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11054","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11054"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6074","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6074"},{"reference_url":"http://support.apple.com/kb/HT4077","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4077"},{"reference_url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0042","reference_id":"","reference_type":"","scores":[],"url":"http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0042"},{"reference_url":"http://www.debian.org/security/2009/dsa-1738","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2009/dsa-1738"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0341.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0341.html"},{"reference_url":"http://www.securityfocus.com/archive/1/501757/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/501757/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/504849/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/504849/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/33962","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/33962"},{"reference_url":"http://www.securitytracker.com/id?1021783","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021783"},{"reference_url":"http://www.ubuntu.com/usn/USN-726-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-726-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2009-0009.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2009-0009.html"},{"reference_url":"http://www.vupen.com/english/advisories/2009/0581","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/0581"},{"reference_url":"http://www.vupen.com/english/advisories/2009/1865","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/1865"},{"reference_url":"http://www.withdk.com/2009/03/03/curllibcurl-redirect-arbitrary-file-access/","reference_id":"","reference_type":"","scores":[],"url":"http://www.withdk.com/2009/03/03/curllibcurl-redirect-arbitrary-file-access/"},{"reference_url":"http://www.withdk.com/archives/Libcurl_arbitrary_file_access.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://www.withdk.com/archives/Libcurl_arbitrary_file_access.pdf"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=485271","reference_id":"485271","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=485271"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=518423","reference_id":"518423","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=518423"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:5.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:5.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:5.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.1beta:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.1beta:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.1beta:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:6.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:6.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.10.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.10.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.15.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.15.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.16.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.16.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.16.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.16.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.16.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.16.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.19.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.19.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.19.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.9.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.9.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:5.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:5.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:5.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.15.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.15.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.16.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.16.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.16.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.19.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:libcurl:7.19.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:libcurl:7.19.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0037","reference_id":"CVE-2009-0037","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0037"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/32834.txt","reference_id":"CVE-2009-0037;OSVDB-53572","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/32834.txt"},{"reference_url":"https://www.securityfocus.com/bid/33962/info","reference_id":"CVE-2009-0037;OSVDB-53572","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/33962/info"},{"reference_url":"https://security.gentoo.org/glsa/200903-21","reference_id":"GLSA-200903-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200903-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0341","reference_id":"RHSA-2009:0341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0341"},{"reference_url":"https://usn.ubuntu.com/726-1/","reference_id":"USN-726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/726-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370728?format=json","purl":"pkg:generic/curl.se/curl@7.19.4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4mk9-5buz-puh5"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-87qu-j64w-p7fj"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-c2na-7q9e-47am"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dj5e-62rt-hkex"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e1yx-dxa6-1bba"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eer3-29q8-sbgq"},{"vulnerability":"VCID-exhe-cmqf-duad"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-prff-34kh-kbat"},{"vulnerability":"VCID-r3ny-7kn7-ukaa"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sknq-8mm1-6qfe"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-z49y-v1gh-h7gj"},{"vulnerability":"VCID-z8h3-fdj8-xuaa"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.19.4"}],"aliases":["CVE-2009-0037"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2f5z-vxsz-yqdv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49279?format=json","vulnerability_id":"VCID-2xmp-jc8v-bucb","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35252.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-35252.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-35252","reference_id":"","reference_type":"","scores":[{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43804","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43779","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43787","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43736","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52318","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52332","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52348","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.5236","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52298","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52356","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58219","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58205","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58912","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-35252"},{"reference_url":"https://curl.se/docs/CVE-2022-35252.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-35252.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35252"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1613943","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"}],"url":"https://hackerone.com/reports/1613943"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018831","reference_id":"1018831","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1018831"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jan/20","reference_id":"20","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jan/20"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jan/21","reference_id":"21","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jan/21"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2120718","reference_id":"2120718","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2120718"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://support.apple.com/kb/HT213603","reference_id":"HT213603","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"}],"url":"https://support.apple.com/kb/HT213603"},{"reference_url":"https://support.apple.com/kb/HT213604","reference_id":"HT213604","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"}],"url":"https://support.apple.com/kb/HT213604"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html","reference_id":"msg00028.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220930-0005/","reference_id":"ntap-20220930-0005","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:42Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220930-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8840","reference_id":"RHSA-2022:8840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8841","reference_id":"RHSA-2022:8841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2478","reference_id":"RHSA-2023:2478","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2478"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2963","reference_id":"RHSA-2023:2963","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2963"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0428","reference_id":"RHSA-2024:0428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0428"},{"reference_url":"https://usn.ubuntu.com/5587-1/","reference_id":"USN-5587-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5587-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370829?format=json","purl":"pkg:generic/curl.se/curl@7.85.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bz4u-6rft-s3a8"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-ej47-4dcu-5fhy"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-m15r-v9sr-2bbn"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rg54-svzj-x7f9"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-tha5-fv3w-sub6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.85.0"}],"aliases":["CVE-2022-35252"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2xmp-jc8v-bucb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49266?format=json","vulnerability_id":"VCID-3sy2-4f3g-zkac","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27774.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27774.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27774","reference_id":"","reference_type":"","scores":[{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53835","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53855","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53749","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53775","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53748","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53801","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53799","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53847","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.5383","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53851","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53814","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54535","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54541","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54556","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27774"},{"reference_url":"https://curl.se/docs/CVE-2022-27774.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-27774.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1543773","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:41:23Z/"}],"url":"https://hackerone.com/reports/1543773"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010254","reference_id":"1010254","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010254"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077547","reference_id":"2077547","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2077547"},{"reference_url":"https://security.archlinux.org/AVG-2685","reference_id":"AVG-2685","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2685"},{"reference_url":"https://www.debian.org/security/2022/dsa-5197","reference_id":"dsa-5197","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:41:23Z/"}],"url":"https://www.debian.org/security/2022/dsa-5197"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:41:23Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html","reference_id":"msg00028.html","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:41:23Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220609-0008/","reference_id":"ntap-20220609-0008","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:41:23Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220609-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5245","reference_id":"RHSA-2022:5245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5313","reference_id":"RHSA-2022:5313","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5313"},{"reference_url":"https://usn.ubuntu.com/5397-1/","reference_id":"USN-5397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5397-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370826?format=json","purl":"pkg:generic/curl.se/curl@7.83.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-6ge5-86tg-dydf"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-ej47-4dcu-5fhy"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-gv7x-j8bz-wycc"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-hjkx-6yep-mkde"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-m15r-v9sr-2bbn"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rhxh-77pj-1bfy"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t1fk-cbsx-j3gh"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v9n1-d6xt-6ubn"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-xzay-sjpy-3yce"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.83.0"}],"aliases":["CVE-2022-27774"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3sy2-4f3g-zkac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57268?format=json","vulnerability_id":"VCID-47qb-2qkw-1qej","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28321.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28321.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28321","reference_id":"","reference_type":"","scores":[{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50659","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50695","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50746","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50704","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.52991","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.52966","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53064","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53057","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.5302","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53037","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53052","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53003","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53009","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.52959","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28321"},{"reference_url":"https://curl.se/docs/CVE-2023-28321.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-28321.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28321"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1950627","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://hackerone.com/reports/1950627"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239","reference_id":"1036239","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196786","reference_id":"2196786","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196786"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/47","reference_id":"47","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/47"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/48","reference_id":"48","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/48"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/52","reference_id":"52","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/52"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/","reference_id":"F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://support.apple.com/kb/HT213843","reference_id":"HT213843","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://support.apple.com/kb/HT213843"},{"reference_url":"https://support.apple.com/kb/HT213844","reference_id":"HT213844","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://support.apple.com/kb/HT213844"},{"reference_url":"https://support.apple.com/kb/HT213845","reference_id":"HT213845","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://support.apple.com/kb/HT213845"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html","reference_id":"msg00016.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230609-0009/","reference_id":"ntap-20230609-0009","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230609-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4354","reference_id":"RHSA-2023:4354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4354"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4523","reference_id":"RHSA-2023:4523","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4523"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4628","reference_id":"RHSA-2023:4628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4629","reference_id":"RHSA-2023:4629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5598","reference_id":"RHSA-2023:5598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6292","reference_id":"RHSA-2023:6292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6292"},{"reference_url":"https://usn.ubuntu.com/6237-1/","reference_id":"USN-6237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6237-1/"},{"reference_url":"https://usn.ubuntu.com/6237-3/","reference_id":"USN-6237-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6237-3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/","reference_id":"Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:54:13Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370836?format=json","purl":"pkg:generic/curl.se/curl@8.1.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bz4u-6rft-s3a8"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-tha5-fv3w-sub6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.1.0"}],"aliases":["CVE-2023-28321"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-47qb-2qkw-1qej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56919?format=json","vulnerability_id":"VCID-4drq-2td7-akbk","summary":"cURL is vulnerable to a buffer overflow which could lead to the execution\n    of arbitrary code.","references":[{"reference_url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt"},{"reference_url":"http://docs.info.apple.com/article.html?artnum=302847","reference_id":"","reference_type":"","scores":[],"url":"http://docs.info.apple.com/article.html?artnum=302847"},{"reference_url":"http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3185.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3185.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3185","reference_id":"","reference_type":"","scores":[{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89571","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89504","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89552","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89567","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89508","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89519","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.8952","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89536","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89539","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89547","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89544","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89553","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89555","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3185"},{"reference_url":"https://curl.se/docs/CVE-2005-3185.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2005-3185.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185"},{"reference_url":"http://secunia.com/advisories/17192","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17192"},{"reference_url":"http://secunia.com/advisories/17193","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17193"},{"reference_url":"http://secunia.com/advisories/17203","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17203"},{"reference_url":"http://secunia.com/advisories/17208","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17208"},{"reference_url":"http://secunia.com/advisories/17228","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17228"},{"reference_url":"http://secunia.com/advisories/17247","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17247"},{"reference_url":"http://secunia.com/advisories/17297","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17297"},{"reference_url":"http://secunia.com/advisories/17320","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17320"},{"reference_url":"http://secunia.com/advisories/17400","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17400"},{"reference_url":"http://secunia.com/advisories/17403","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17403"},{"reference_url":"http://secunia.com/advisories/17485","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17485"},{"reference_url":"http://secunia.com/advisories/17813","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17813"},{"reference_url":"http://secunia.com/advisories/17965","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17965"},{"reference_url":"http://secunia.com/advisories/19193","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19193"},{"reference_url":"http://securityreason.com/securityalert/82","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/82"},{"reference_url":"http://securitytracker.com/id?1015056","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1015056"},{"reference_url":"http://securitytracker.com/id?1015057","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1015057"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/22721","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/22721"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.519010","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.519010"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810"},{"reference_url":"http://www.debian.org/security/2005/dsa-919","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-919"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml"},{"reference_url":"http://www.idefense.com/application/poi/display?id=322&type=vulnerabilities","reference_id":"","reference_type":"","scores":[],"url":"http://www.idefense.com/application/poi/display?id=322&type=vulnerabilities"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:182","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:182"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html"},{"reference_url":"http://www.osvdb.org/20011","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/20011"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-807.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-807.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-812.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-812.html"},{"reference_url":"http://www.securityfocus.com/bid/15102","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/15102"},{"reference_url":"http://www.securityfocus.com/bid/15647","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/15647"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2088","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2088"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2125","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2125"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2659","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2659"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617794","reference_id":"1617794","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617794"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=333734","reference_id":"333734","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=333734"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libcurl:libcurl:7.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libcurl:libcurl:7.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libcurl:libcurl:7.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wget:wget:1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wget:wget:1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wget:wget:1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3185","reference_id":"CVE-2005-3185","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3185"},{"reference_url":"https://security.gentoo.org/glsa/200510-19","reference_id":"GLSA-200510-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200510-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:807","reference_id":"RHSA-2005:807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:812","reference_id":"RHSA-2005:812","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:812"},{"reference_url":"https://usn.ubuntu.com/205-1/","reference_id":"USN-205-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/205-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370708?format=json","purl":"pkg:generic/curl.se/curl@7.15.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2f5z-vxsz-yqdv"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4mk9-5buz-puh5"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-9q2w-yxvk-pbhd"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-c2na-7q9e-47am"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dj5e-62rt-hkex"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e1yx-dxa6-1bba"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-exhe-cmqf-duad"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-prff-34kh-kbat"},{"vulnerability":"VCID-r3ny-7kn7-ukaa"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sknq-8mm1-6qfe"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-xkw8-ptjd-sfb6"},{"vulnerability":"VCID-xm7g-6w3z-37fs"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-z49y-v1gh-h7gj"},{"vulnerability":"VCID-z8h3-fdj8-xuaa"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.15.0"}],"aliases":["CVE-2005-3185"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4drq-2td7-akbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51947?format=json","vulnerability_id":"VCID-4mk9-5buz-puh5","summary":"Multiple vulnerabilities have been discovered in cURL, the worst of\n    which could lead to man-in-the-middle attacks.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0139.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0139.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0139","reference_id":"","reference_type":"","scores":[{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.79009","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78884","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78891","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78919","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78902","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78927","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78933","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78941","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78931","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.7896","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78957","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78986","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01203","scoring_system":"epss","scoring_elements":"0.78993","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0139"},{"reference_url":"https://curl.se/docs/CVE-2014-0139.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2014-0139.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1079149","reference_id":"1079149","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1079149"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742728","reference_id":"742728","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742728"},{"reference_url":"https://security.gentoo.org/glsa/201406-21","reference_id":"GLSA-201406-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-21"},{"reference_url":"https://usn.ubuntu.com/2167-1/","reference_id":"USN-2167-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2167-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370758?format=json","purl":"pkg:generic/curl.se/curl@7.36.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bgtv-jrna-9yb3"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-eer3-29q8-sbgq"},{"vulnerability":"VCID-ekav-zg3k-v3ea"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sknq-8mm1-6qfe"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-t753-w1ha-kqaz"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wh98-pw9h-cyfx"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.36.0"}],"aliases":["CVE-2014-0139"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4mk9-5buz-puh5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34697?format=json","vulnerability_id":"VCID-6muy-xpdq-9kg8","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8616.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8616.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8616","reference_id":"","reference_type":"","scores":[{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88589","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88673","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.8864","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88652","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88645","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88658","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88655","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88653","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88668","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88674","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88598","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88616","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88617","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0413","scoring_system":"epss","scoring_elements":"0.88635","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8616"},{"reference_url":"https://curl.se/docs/CVE-2016-8616.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8616.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388371","reference_id":"1388371","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388371"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370780?format=json","purl":"pkg:generic/curl.se/curl@7.51.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0"}],"aliases":["CVE-2016-8616"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6muy-xpdq-9kg8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71914?format=json","vulnerability_id":"VCID-6we4-n888-6qhe","summary":"libcurl: Buffer Overflow in libcurl via zlib Integer Overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0725.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0725.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0725","reference_id":"","reference_type":"","scores":[{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63322","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63305","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63314","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.6327","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63867","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63788","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63815","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63772","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63823","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.6384","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63856","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00454","scoring_system":"epss","scoring_elements":"0.63869","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0725"},{"reference_url":"https://curl.se/docs/CVE-2025-0725.html","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-05T14:33:50Z/"}],"url":"https://curl.se/docs/CVE-2025-0725.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0725","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0725"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/2956023","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-05T14:33:50Z/"}],"url":"https://hackerone.com/reports/2956023"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2343899","reference_id":"2343899","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2343899"},{"reference_url":"https://curl.se/docs/CVE-2025-0725.json","reference_id":"CVE-2025-0725.json","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-05T14:33:50Z/"}],"url":"https://curl.se/docs/CVE-2025-0725.json"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370854?format=json","purl":"pkg:generic/curl.se/curl@8.12.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-176a-agbw-hqdy"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9mjz-apkm-g7h1"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-ksap-zrmb-ebcu"},{"vulnerability":"VCID-kt4b-7ffh-4bch"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.12.0"}],"aliases":["CVE-2025-0725"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6we4-n888-6qhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49700?format=json","vulnerability_id":"VCID-6yb7-t8qs-cbch","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000007.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000007.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000007","reference_id":"","reference_type":"","scores":[{"value":"0.03344","scoring_system":"epss","scoring_elements":"0.87259","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03344","scoring_system":"epss","scoring_elements":"0.87285","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03344","scoring_system":"epss","scoring_elements":"0.87269","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03344","scoring_system":"epss","scoring_elements":"0.87283","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03344","scoring_system":"epss","scoring_elements":"0.87302","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03871","scoring_system":"epss","scoring_elements":"0.88245","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03871","scoring_system":"epss","scoring_elements":"0.88227","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03871","scoring_system":"epss","scoring_elements":"0.88238","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03871","scoring_system":"epss","scoring_elements":"0.88231","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03871","scoring_system":"epss","scoring_elements":"0.88244","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03871","scoring_system":"epss","scoring_elements":"0.88263","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03871","scoring_system":"epss","scoring_elements":"0.88268","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03871","scoring_system":"epss","scoring_elements":"0.8827","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000007"},{"reference_url":"https://curl.se/docs/CVE-2018-1000007.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2018-1000007.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1537125","reference_id":"1537125","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1537125"},{"reference_url":"https://security.archlinux.org/ASA-201801-20","reference_id":"ASA-201801-20","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-20"},{"reference_url":"https://security.archlinux.org/ASA-201801-22","reference_id":"ASA-201801-22","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-22"},{"reference_url":"https://security.archlinux.org/ASA-201801-23","reference_id":"ASA-201801-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-23"},{"reference_url":"https://security.archlinux.org/ASA-201801-24","reference_id":"ASA-201801-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-24"},{"reference_url":"https://security.archlinux.org/ASA-201801-25","reference_id":"ASA-201801-25","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-25"},{"reference_url":"https://security.archlinux.org/ASA-201801-26","reference_id":"ASA-201801-26","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-26"},{"reference_url":"https://security.archlinux.org/AVG-593","reference_id":"AVG-593","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-593"},{"reference_url":"https://security.archlinux.org/AVG-594","reference_id":"AVG-594","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-594"},{"reference_url":"https://security.archlinux.org/AVG-595","reference_id":"AVG-595","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-595"},{"reference_url":"https://security.archlinux.org/AVG-596","reference_id":"AVG-596","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-596"},{"reference_url":"https://security.archlinux.org/AVG-597","reference_id":"AVG-597","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-597"},{"reference_url":"https://security.archlinux.org/AVG-598","reference_id":"AVG-598","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-598"},{"reference_url":"https://security.gentoo.org/glsa/201804-04","reference_id":"GLSA-201804-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-04"},{"reference_url":"https://usn.ubuntu.com/3554-1/","reference_id":"USN-3554-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3554-1/"},{"reference_url":"https://usn.ubuntu.com/3554-2/","reference_id":"USN-3554-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3554-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370792?format=json","purl":"pkg:generic/curl.se/curl@7.58.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dhrf-2sz5-3bhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-krgt-drpz-y7cy"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-vr9x-yqsd-6fc8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xzay-sjpy-3yce"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.58.0"}],"aliases":["CVE-2018-1000007"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6yb7-t8qs-cbch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80714?format=json","vulnerability_id":"VCID-7c8e-eaqy-akeu","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3153.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3153.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3153","reference_id":"","reference_type":"","scores":[{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92973","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92922","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.9293","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92934","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92933","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92941","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.9295","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92949","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.9296","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92962","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92969","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0976","scoring_system":"epss","scoring_elements":"0.92972","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3153"},{"reference_url":"https://curl.se/docs/CVE-2015-3153.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2015-3153.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1217341","reference_id":"1217341","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1217341"},{"reference_url":"https://usn.ubuntu.com/2591-1/","reference_id":"USN-2591-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2591-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370766?format=json","purl":"pkg:generic/curl.se/curl@7.42.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bgtv-jrna-9yb3"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-r447-deb8-2ydj"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yubp-g4rt-c3e6"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.42.1"}],"aliases":["CVE-2015-3153"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7c8e-eaqy-akeu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34691?format=json","vulnerability_id":"VCID-7xxh-66ys-4bhw","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5419.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5419.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5419","reference_id":"","reference_type":"","scores":[{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83461","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83598","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83586","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83593","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83474","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83488","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83487","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83511","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83521","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83535","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83529","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83526","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.8356","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83561","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01968","scoring_system":"epss","scoring_elements":"0.83562","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5419"},{"reference_url":"https://curl.se/docs/CVE-2016-5419.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-5419.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1362183","reference_id":"1362183","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1362183"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2575","reference_id":"RHSA-2016:2575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2957","reference_id":"RHSA-2016:2957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2957"},{"reference_url":"https://usn.ubuntu.com/3048-1/","reference_id":"USN-3048-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3048-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370777?format=json","purl":"pkg:generic/curl.se/curl@7.50.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.50.1"}],"aliases":["CVE-2016-5419"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7xxh-66ys-4bhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64299?format=json","vulnerability_id":"VCID-8zks-th64-33b8","summary":"curl: curl: Unauthorized access due to improper HTTP proxy connection reuse","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3784.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3784.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3784","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03053","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03037","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03051","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03056","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03081","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03044","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03709","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03671","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03659","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03792","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03683","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06096","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06126","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00022","scoring_system":"epss","scoring_elements":"0.06133","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3784"},{"reference_url":"https://curl.se/docs/CVE-2026-3784.html","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:48:38Z/"}],"url":"https://curl.se/docs/CVE-2026-3784.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3784","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3784"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/3584903","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:48:38Z/"}],"url":"https://hackerone.com/reports/3584903"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2446449","reference_id":"2446449","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2446449"},{"reference_url":"https://curl.se/docs/CVE-2026-3784.json","reference_id":"CVE-2026-3784.json","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:48:38Z/"}],"url":"https://curl.se/docs/CVE-2026-3784.json"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:6893","reference_id":"RHSA-2026:6893","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:6893"},{"reference_url":"https://usn.ubuntu.com/8084-1/","reference_id":"USN-8084-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8084-1/"},{"reference_url":"https://usn.ubuntu.com/8099-1/","reference_id":"USN-8099-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8099-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370671?format=json","purl":"pkg:generic/curl.se/curl@8.19.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-acd8-mwm2-zka5"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.19.0"}],"aliases":["CVE-2026-3784"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8zks-th64-33b8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49278?format=json","vulnerability_id":"VCID-9nak-pscy-e7gs","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32221.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32221.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32221","reference_id":"","reference_type":"","scores":[{"value":"0.01612","scoring_system":"epss","scoring_elements":"0.81849","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01612","scoring_system":"epss","scoring_elements":"0.81845","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82219","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82179","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82218","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01681","scoring_system":"epss","scoring_elements":"0.82185","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01711","scoring_system":"epss","scoring_elements":"0.82397","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02591","scoring_system":"epss","scoring_elements":"0.85547","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02591","scoring_system":"epss","scoring_elements":"0.8553","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02753","scoring_system":"epss","scoring_elements":"0.85969","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02753","scoring_system":"epss","scoring_elements":"0.86012","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02753","scoring_system":"epss","scoring_elements":"0.85998","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02753","scoring_system":"epss","scoring_elements":"0.85988","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32221"},{"reference_url":"https://curl.se/docs/CVE-2022-32221.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-32221.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1704017","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"https://hackerone.com/reports/1704017"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jan/19","reference_id":"19","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jan/19"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jan/20","reference_id":"20","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jan/20"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2135411","reference_id":"2135411","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2135411"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/05/17/4","reference_id":"4","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/05/17/4"},{"reference_url":"https://www.debian.org/security/2023/dsa-5330","reference_id":"dsa-5330","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"https://www.debian.org/security/2023/dsa-5330"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://support.apple.com/kb/HT213604","reference_id":"HT213604","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"https://support.apple.com/kb/HT213604"},{"reference_url":"https://support.apple.com/kb/HT213605","reference_id":"HT213605","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"https://support.apple.com/kb/HT213605"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html","reference_id":"msg00028.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00028.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230110-0006/","reference_id":"ntap-20230110-0006","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230110-0006/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230208-0002/","reference_id":"ntap-20230208-0002","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-05-20T15:51:51Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230208-0002/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8840","reference_id":"RHSA-2022:8840","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8841","reference_id":"RHSA-2022:8841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0333","reference_id":"RHSA-2023:0333","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0333"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4139","reference_id":"RHSA-2023:4139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4139"},{"reference_url":"https://usn.ubuntu.com/5702-1/","reference_id":"USN-5702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5702-1/"},{"reference_url":"https://usn.ubuntu.com/5702-2/","reference_id":"USN-5702-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5702-2/"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370830?format=json","purl":"pkg:generic/curl.se/curl@7.86.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bz4u-6rft-s3a8"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-m15r-v9sr-2bbn"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-tha5-fv3w-sub6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.86.0"}],"aliases":["CVE-2022-32221"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9nak-pscy-e7gs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49918?format=json","vulnerability_id":"VCID-9q2w-yxvk-pbhd","summary":"cURL is vulnerable to local arbitrary code execution via buffer overflow\n    due to the insecure parsing of URLs.","references":[{"reference_url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.16/SCOSA-2006.16.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.16/SCOSA-2006.16.txt"},{"reference_url":"http://curl.haxx.se/docs/adv_20051207.html","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/docs/adv_20051207.html"},{"reference_url":"http://docs.info.apple.com/article.html?artnum=307562","reference_id":"","reference_type":"","scores":[],"url":"http://docs.info.apple.com/article.html?artnum=307562"},{"reference_url":"http://lists.apple.com/archives/security-announce/2006/May/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2006/May/msg00003.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"},{"reference_url":"http://qa.openoffice.org/issues/show_bug.cgi?id=59032","reference_id":"","reference_type":"","scores":[],"url":"http://qa.openoffice.org/issues/show_bug.cgi?id=59032"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4077.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4077.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-4077","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50061","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50051","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50102","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50108","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50085","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50113","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50063","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50117","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5011","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50128","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50101","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50143","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50115","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-4077"},{"reference_url":"https://curl.se/docs/CVE-2005-4077.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2005-4077.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4077","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4077"},{"reference_url":"http://secunia.com/advisories/17907","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17907"},{"reference_url":"http://secunia.com/advisories/17960","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17960"},{"reference_url":"http://secunia.com/advisories/17961","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17961"},{"reference_url":"http://secunia.com/advisories/17965","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17965"},{"reference_url":"http://secunia.com/advisories/17977","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17977"},{"reference_url":"http://secunia.com/advisories/18105","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18105"},{"reference_url":"http://secunia.com/advisories/18188","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18188"},{"reference_url":"http://secunia.com/advisories/18336","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18336"},{"reference_url":"http://secunia.com/advisories/19261","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19261"},{"reference_url":"http://secunia.com/advisories/19433","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19433"},{"reference_url":"http://secunia.com/advisories/19457","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19457"},{"reference_url":"http://secunia.com/advisories/20077","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/20077"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10855","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10855"},{"reference_url":"http://www.debian.org/security/2005/dsa-919","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-919"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200512-09.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200512-09.xml"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200603-25.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200603-25.xml"},{"reference_url":"http://www.hardened-php.net/advisory_242005.109.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.hardened-php.net/advisory_242005.109.html"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:224","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:224"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-875.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-875.html"},{"reference_url":"http://www.securityfocus.com/archive/1/418849/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/418849/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/15756","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/15756"},{"reference_url":"http://www.securityfocus.com/bid/17951","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/17951"},{"reference_url":"http://www.trustix.org/errata/2005/0072/","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2005/0072/"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA06-132A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA06-132A.html"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2791","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2791"},{"reference_url":"http://www.vupen.com/english/advisories/2006/0960","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/0960"},{"reference_url":"http://www.vupen.com/english/advisories/2006/1779","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/1779"},{"reference_url":"http://www.vupen.com/english/advisories/2008/0924/references","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/0924/references"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617850","reference_id":"1617850","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617850"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342339","reference_id":"342339","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342339"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:daniel_stenberg:curl:7.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:daniel_stenberg:curl:7.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:daniel_stenberg:curl:7.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:daniel_stenberg:curl:7.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:daniel_stenberg:curl:7.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:daniel_stenberg:curl:7.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:daniel_stenberg:curl:7.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:daniel_stenberg:curl:7.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:daniel_stenberg:curl:7.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:daniel_stenberg:curl:7.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:daniel_stenberg:curl:7.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:daniel_stenberg:curl:7.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-4077","reference_id":"CVE-2005-4077","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-4077"},{"reference_url":"https://security.gentoo.org/glsa/200512-09","reference_id":"GLSA-200512-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200512-09"},{"reference_url":"https://security.gentoo.org/glsa/200603-25","reference_id":"GLSA-200603-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200603-25"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:875","reference_id":"RHSA-2005:875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:875"},{"reference_url":"https://usn.ubuntu.com/228-1/","reference_id":"USN-228-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/228-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370709?format=json","purl":"pkg:generic/curl.se/curl@7.15.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2f5z-vxsz-yqdv"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4mk9-5buz-puh5"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-c2na-7q9e-47am"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dj5e-62rt-hkex"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e1yx-dxa6-1bba"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-exhe-cmqf-duad"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-prff-34kh-kbat"},{"vulnerability":"VCID-r3ny-7kn7-ukaa"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sknq-8mm1-6qfe"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-xkw8-ptjd-sfb6"},{"vulnerability":"VCID-xm7g-6w3z-37fs"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-z49y-v1gh-h7gj"},{"vulnerability":"VCID-z8h3-fdj8-xuaa"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.15.1"}],"aliases":["CVE-2005-4077"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9q2w-yxvk-pbhd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59713?format=json","vulnerability_id":"VCID-ae59-w7a1-7keg","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2486","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3558","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3558"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000254.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000254.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000254","reference_id":"","reference_type":"","scores":[{"value":"0.01178","scoring_system":"epss","scoring_elements":"0.78736","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01178","scoring_system":"epss","scoring_elements":"0.78727","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01318","scoring_system":"epss","scoring_elements":"0.79946","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01318","scoring_system":"epss","scoring_elements":"0.79891","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01318","scoring_system":"epss","scoring_elements":"0.79892","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01318","scoring_system":"epss","scoring_elements":"0.79894","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01318","scoring_system":"epss","scoring_elements":"0.79923","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01318","scoring_system":"epss","scoring_elements":"0.79929","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80036","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80064","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80053","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80081","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80089","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80109","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80043","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000254"},{"reference_url":"https://curl.haxx.se/673d0cd8.patch","reference_id":"","reference_type":"","scores":[],"url":"https://curl.haxx.se/673d0cd8.patch"},{"reference_url":"https://curl.haxx.se/docs/adv_20171004.html","reference_id":"","reference_type":"","scores":[],"url":"https://curl.haxx.se/docs/adv_20171004.html"},{"reference_url":"https://curl.se/docs/CVE-2017-1000254.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2017-1000254.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000100"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000101"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000254"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"https://support.apple.com/HT208331","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT208331"},{"reference_url":"http://www.debian.org/security/2017/dsa-3992","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3992"},{"reference_url":"http://www.securityfocus.com/bid/101115","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101115"},{"reference_url":"http://www.securitytracker.com/id/1039509","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039509"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1495541","reference_id":"1495541","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1495541"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877671","reference_id":"877671","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877671"},{"reference_url":"https://security.archlinux.org/ASA-201710-2","reference_id":"ASA-201710-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-2"},{"reference_url":"https://security.archlinux.org/ASA-201710-3","reference_id":"ASA-201710-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-3"},{"reference_url":"https://security.archlinux.org/ASA-201710-4","reference_id":"ASA-201710-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-4"},{"reference_url":"https://security.archlinux.org/ASA-201710-5","reference_id":"ASA-201710-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-5"},{"reference_url":"https://security.archlinux.org/ASA-201710-6","reference_id":"ASA-201710-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-6"},{"reference_url":"https://security.archlinux.org/ASA-201710-7","reference_id":"ASA-201710-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-7"},{"reference_url":"https://security.archlinux.org/AVG-371","reference_id":"AVG-371","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-371"},{"reference_url":"https://security.archlinux.org/AVG-386","reference_id":"AVG-386","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-386"},{"reference_url":"https://security.archlinux.org/AVG-387","reference_id":"AVG-387","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-387"},{"reference_url":"https://security.archlinux.org/AVG-388","reference_id":"AVG-388","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-388"},{"reference_url":"https://security.archlinux.org/AVG-389","reference_id":"AVG-389","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-389"},{"reference_url":"https://security.archlinux.org/AVG-422","reference_id":"AVG-422","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-422"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.38.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.39:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.40.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.41.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.43.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.44.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.45.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.46.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.47.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.48.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.49.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.50.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.51.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.52.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.53.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.54.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.55.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.55.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.55.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000254","reference_id":"CVE-2017-1000254","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-1000254"},{"reference_url":"https://security.gentoo.org/glsa/201712-04","reference_id":"GLSA-201712-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201712-04"},{"reference_url":"https://usn.ubuntu.com/3441-1/","reference_id":"USN-3441-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3441-1/"},{"reference_url":"https://usn.ubuntu.com/3441-2/","reference_id":"USN-3441-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3441-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370789?format=json","purl":"pkg:generic/curl.se/curl@7.56.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dhrf-2sz5-3bhf"},{"vulnerability":"VCID-drkp-q9r5-ukcm"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-krgt-drpz-y7cy"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vr9x-yqsd-6fc8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.56.0"}],"aliases":["CVE-2017-1000254"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ae59-w7a1-7keg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57263?format=json","vulnerability_id":"VCID-arjz-67yz-wkg9","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27533.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27533.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27533","reference_id":"","reference_type":"","scores":[{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38441","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38719","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38554","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38529","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.4044","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40439","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40465","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40389","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40451","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40463","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40415","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40434","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40472","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00216","scoring_system":"epss","scoring_elements":"0.4427","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-27533"},{"reference_url":"https://curl.se/docs/CVE-2023-27533.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-27533.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27533","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27533"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1891474","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/"}],"url":"https://hackerone.com/reports/1891474"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179062","reference_id":"2179062","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2179062"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/","reference_id":"36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html","reference_id":"msg00025.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230420-0011/","reference_id":"ntap-20230420-0011","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-02-13T20:09:15Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230420-0011/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3354","reference_id":"RHSA-2023:3354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3354"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3355","reference_id":"RHSA-2023:3355","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6679","reference_id":"RHSA-2023:6679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6679"},{"reference_url":"https://usn.ubuntu.com/5964-1/","reference_id":"USN-5964-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5964-1/"},{"reference_url":"https://usn.ubuntu.com/5964-2/","reference_id":"USN-5964-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5964-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370834?format=json","purl":"pkg:generic/curl.se/curl@8.0.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bz4u-6rft-s3a8"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-m15r-v9sr-2bbn"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-tha5-fv3w-sub6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.0.0"}],"aliases":["CVE-2023-27533"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-arjz-67yz-wkg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34689?format=json","vulnerability_id":"VCID-b2ef-zj3u-rbhy","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"http://curl.haxx.se/docs/adv_20160127A.html","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/docs/adv_20160127A.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176546.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177342.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177383.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176413.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00044.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-02/msg00047.html"},{"reference_url":"http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/135695/Slackware-Security-Advisory-curl-Updates.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0755.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0755.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0755","reference_id":"","reference_type":"","scores":[{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61478","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61466","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61483","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61326","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61402","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61431","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61401","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61447","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61463","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61484","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61471","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61452","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61492","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61496","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00412","scoring_system":"epss","scoring_elements":"0.61479","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0755"},{"reference_url":"https://curl.se/docs/CVE-2016-0755.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-0755.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755"},{"reference_url":"https://support.apple.com/HT207170","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/HT207170"},{"reference_url":"http://www.debian.org/security/2016/dsa-3455","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3455"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"reference_url":"http://www.securityfocus.com/bid/82307","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82307"},{"reference_url":"http://www.securitytracker.com/id/1034882","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034882"},{"reference_url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965","reference_id":"","reference_type":"","scores":[],"url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.519965"},{"reference_url":"http://www.ubuntu.com/usn/USN-2882-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2882-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1302263","reference_id":"1302263","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1302263"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0755","reference_id":"CVE-2016-0755","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"},{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0755"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://usn.ubuntu.com/2882-1/","reference_id":"USN-2882-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2882-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370771?format=json","purl":"pkg:generic/curl.se/curl@7.47.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bgtv-jrna-9yb3"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.47.0"}],"aliases":["CVE-2016-0755"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b2ef-zj3u-rbhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/354617?format=json","vulnerability_id":"VCID-bgdk-ebn7-eycn","summary":"","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5545.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5545.json"},{"reference_url":"https://curl.se/docs/CVE-2026-5545.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2026-5545.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5545"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/3642555","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/3642555"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2461204","reference_id":"2461204","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2461204"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1088653?format=json","purl":"pkg:generic/curl.se/curl@8.20.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.20.0"}],"aliases":["CVE-2026-5545"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bgdk-ebn7-eycn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89213?format=json","vulnerability_id":"VCID-bvgs-71kb-mbcx","summary":"security flaw","references":[{"reference_url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000940","reference_id":"","reference_type":"","scores":[],"url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000940"},{"reference_url":"http://marc.info/?l=full-disclosure&m=110959085507755&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=full-disclosure&m=110959085507755&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0490.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0490.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0490","reference_id":"","reference_type":"","scores":[{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85611","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85578","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85599","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.8561","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85483","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85495","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85512","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85516","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85536","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85545","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.8556","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85557","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85553","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85577","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02576","scoring_system":"epss","scoring_elements":"0.85582","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0490"},{"reference_url":"https://curl.se/docs/CVE-2005-0490.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2005-0490.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0490"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19423","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19423"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10273"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200503-20.xml"},{"reference_url":"http://www.idefense.com/application/poi/display?id=202&type=vulnerabilities","reference_id":"","reference_type":"","scores":[],"url":"http://www.idefense.com/application/poi/display?id=202&type=vulnerabilities"},{"reference_url":"http://www.idefense.com/application/poi/display?id=203&type=vulnerabilities","reference_id":"","reference_type":"","scores":[],"url":"http://www.idefense.com/application/poi/display?id=203&type=vulnerabilities"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:048","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:048"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_11_curl.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_11_curl.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-340.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-340.html"},{"reference_url":"http://www.securityfocus.com/bid/12615","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/12615"},{"reference_url":"http://www.securityfocus.com/bid/12616","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/12616"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617532","reference_id":"1617532","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617532"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0490","reference_id":"CVE-2005-0490","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0490"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:340","reference_id":"RHSA-2005:340","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:340"},{"reference_url":"https://usn.ubuntu.com/86-1/","reference_id":"USN-86-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/86-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370704?format=json","purl":"pkg:generic/curl.se/curl@7.13.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2f5z-vxsz-yqdv"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4drq-2td7-akbk"},{"vulnerability":"VCID-4mk9-5buz-puh5"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-9q2w-yxvk-pbhd"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-c2na-7q9e-47am"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dj5e-62rt-hkex"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e1yx-dxa6-1bba"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-exhe-cmqf-duad"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-prff-34kh-kbat"},{"vulnerability":"VCID-r3ny-7kn7-ukaa"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sknq-8mm1-6qfe"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-z49y-v1gh-h7gj"},{"vulnerability":"VCID-z8h3-fdj8-xuaa"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.13.1"}],"aliases":["CVE-2005-0490"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bvgs-71kb-mbcx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56000?format=json","vulnerability_id":"VCID-c2na-7q9e-47am","summary":"information disclosure","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0015.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0015.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0015","reference_id":"","reference_type":"","scores":[{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80477","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80459","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80342","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80348","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80368","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80357","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80386","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80396","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80415","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.804","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80393","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80422","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80423","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80427","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01396","scoring_system":"epss","scoring_elements":"0.80453","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0015"},{"reference_url":"https://curl.se/docs/CVE-2014-0015.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2014-0015.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1053903","reference_id":"1053903","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1053903"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0561","reference_id":"RHSA-2014:0561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0561"},{"reference_url":"https://usn.ubuntu.com/2097-1/","reference_id":"USN-2097-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2097-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370757?format=json","purl":"pkg:generic/curl.se/curl@7.35.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4mk9-5buz-puh5"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bgtv-jrna-9yb3"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-eer3-29q8-sbgq"},{"vulnerability":"VCID-ekav-zg3k-v3ea"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-ma8s-he6x-z7a8"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sknq-8mm1-6qfe"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-t753-w1ha-kqaz"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wh98-pw9h-cyfx"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ya9y-nav3-37hh"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-z8h3-fdj8-xuaa"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.35.0"}],"aliases":["CVE-2014-0015"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c2na-7q9e-47am"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34704?format=json","vulnerability_id":"VCID-c6dk-7gj6-7far","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8623.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8623.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8623","reference_id":"","reference_type":"","scores":[{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74653","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74617","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74707","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74621","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74647","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74667","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.7469","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.7467","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74662","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74699","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.7523","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01197","scoring_system":"epss","scoring_elements":"0.78941","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01197","scoring_system":"epss","scoring_elements":"0.78965","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01197","scoring_system":"epss","scoring_elements":"0.78949","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8623"},{"reference_url":"https://curl.se/docs/CVE-2016-8623.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8623.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037192","reference_id":"1037192","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/"}],"url":"http://www.securitytracker.com/id/1037192"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388388","reference_id":"1388388","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388388"},{"reference_url":"http://www.securityfocus.com/bid/94106","reference_id":"94106","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/"}],"url":"http://www.securityfocus.com/bid/94106"},{"reference_url":"https://curl.haxx.se/docs/adv_20161102I.html","reference_id":"adv_20161102I.html","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/"}],"url":"https://curl.haxx.se/docs/adv_20161102I.html"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://curl.haxx.se/CVE-2016-8623.patch","reference_id":"CVE-2016-8623.patch","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/"}],"url":"https://curl.haxx.se/CVE-2016-8623.patch"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/"}],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623","reference_id":"show_bug.cgi?id=CVE-2016-8623","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:46:38Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8623"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370780?format=json","purl":"pkg:generic/curl.se/curl@7.51.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0"}],"aliases":["CVE-2016-8623"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c6dk-7gj6-7far"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57267?format=json","vulnerability_id":"VCID-ddgz-rczw-jqfw","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28320.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28320.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28320","reference_id":"","reference_type":"","scores":[{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67593","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67504","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67581","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67546","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67579","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67592","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.6757","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67526","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00538","scoring_system":"epss","scoring_elements":"0.67556","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00641","scoring_system":"epss","scoring_elements":"0.70682","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00641","scoring_system":"epss","scoring_elements":"0.70622","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00641","scoring_system":"epss","scoring_elements":"0.70673","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28320"},{"reference_url":"https://curl.se/docs/CVE-2023-28320.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-28320.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28320"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1929597","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"https://hackerone.com/reports/1929597"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239","reference_id":"1036239","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196783","reference_id":"2196783","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196783"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/47","reference_id":"47","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/47"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/48","reference_id":"48","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/48"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/52","reference_id":"52","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/52"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://support.apple.com/kb/HT213843","reference_id":"HT213843","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"https://support.apple.com/kb/HT213843"},{"reference_url":"https://support.apple.com/kb/HT213844","reference_id":"HT213844","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"https://support.apple.com/kb/HT213844"},{"reference_url":"https://support.apple.com/kb/HT213845","reference_id":"HT213845","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"https://support.apple.com/kb/HT213845"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230609-0009/","reference_id":"ntap-20230609-0009","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-15T15:57:47Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230609-0009/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370836?format=json","purl":"pkg:generic/curl.se/curl@8.1.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bz4u-6rft-s3a8"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-tha5-fv3w-sub6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.1.0"}],"aliases":["CVE-2023-28320"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ddgz-rczw-jqfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46646?format=json","vulnerability_id":"VCID-dj5e-62rt-hkex","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which might allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0734.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0734.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0734","reference_id":"","reference_type":"","scores":[{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89482","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.8941","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89425","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89427","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89443","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89446","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89455","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89453","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89449","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89464","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89465","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89462","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89477","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04759","scoring_system":"epss","scoring_elements":"0.89481","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0734"},{"reference_url":"https://curl.se/docs/CVE-2010-0734.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2010-0734.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0734","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0734"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=563220","reference_id":"563220","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=563220"},{"reference_url":"https://security.gentoo.org/glsa/201203-02","reference_id":"GLSA-201203-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201203-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0273","reference_id":"RHSA-2010:0273","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0273"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0329","reference_id":"RHSA-2010:0329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0329"},{"reference_url":"https://usn.ubuntu.com/1158-1/","reference_id":"USN-1158-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1158-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370732?format=json","purl":"pkg:generic/curl.se/curl@7.20.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4mcy-vzmg-mbhz"},{"vulnerability":"VCID-4mk9-5buz-puh5"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-87qu-j64w-p7fj"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-c2na-7q9e-47am"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e1yx-dxa6-1bba"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eer3-29q8-sbgq"},{"vulnerability":"VCID-exhe-cmqf-duad"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-m3nh-aha9-dfbc"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-prff-34kh-kbat"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sknq-8mm1-6qfe"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-z49y-v1gh-h7gj"},{"vulnerability":"VCID-z8h3-fdj8-xuaa"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.20.0"}],"aliases":["CVE-2010-0734"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dj5e-62rt-hkex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34687?format=json","vulnerability_id":"VCID-dzzd-afgu-3fcy","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8150.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8150.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8150","reference_id":"","reference_type":"","scores":[{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79241","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79112","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79119","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79144","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79129","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79153","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79161","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79185","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.7917","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79187","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79184","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79219","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0123","scoring_system":"epss","scoring_elements":"0.79225","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8150"},{"reference_url":"https://curl.se/docs/CVE-2014-8150.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2014-8150.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1178692","reference_id":"1178692","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1178692"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1254","reference_id":"RHSA-2015:1254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1254"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2159","reference_id":"RHSA-2015:2159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2159"},{"reference_url":"https://usn.ubuntu.com/2474-1/","reference_id":"USN-2474-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2474-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370763?format=json","purl":"pkg:generic/curl.se/curl@7.40.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bgtv-jrna-9yb3"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qka4-jfdb-w3d5"},{"vulnerability":"VCID-r447-deb8-2ydj"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wh98-pw9h-cyfx"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yubp-g4rt-c3e6"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.40.0"}],"aliases":["CVE-2014-8150"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dzzd-afgu-3fcy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40939?format=json","vulnerability_id":"VCID-e1yx-dxa6-1bba","summary":"Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3389.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3389.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3389","reference_id":"","reference_type":"","scores":[{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88099","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88165","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88159","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.8816","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88174","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88172","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88108","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88124","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88131","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.8815","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03832","scoring_system":"epss","scoring_elements":"0.88156","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03933","scoring_system":"epss","scoring_elements":"0.88364","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03933","scoring_system":"epss","scoring_elements":"0.88358","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03933","scoring_system":"epss","scoring_elements":"0.88362","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-3389"},{"reference_url":"https://curl.se/docs/CVE-2011-3389.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2011-3389.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=737506","reference_id":"737506","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=737506"},{"reference_url":"https://security.gentoo.org/glsa/201111-02","reference_id":"GLSA-201111-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201111-02"},{"reference_url":"https://security.gentoo.org/glsa/201203-02","reference_id":"GLSA-201203-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201203-02"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1380","reference_id":"RHSA-2011:1380","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1380"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1384","reference_id":"RHSA-2011:1384","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1384"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0006","reference_id":"RHSA-2012:0006","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0034","reference_id":"RHSA-2012:0034","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0034"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0343","reference_id":"RHSA-2012:0343","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0508","reference_id":"RHSA-2012:0508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://usn.ubuntu.com/1263-1/","reference_id":"USN-1263-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1263-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370745?format=json","purl":"pkg:generic/curl.se/curl@7.24.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4mk9-5buz-puh5"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-87qu-j64w-p7fj"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bdrx-sm6b-sken"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c2na-7q9e-47am"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-eer3-29q8-sbgq"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-prff-34kh-kbat"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sknq-8mm1-6qfe"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-z49y-v1gh-h7gj"},{"vulnerability":"VCID-z8h3-fdj8-xuaa"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.24.0"}],"aliases":["CVE-2011-3389"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e1yx-dxa6-1bba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34705?format=json","vulnerability_id":"VCID-e58m-g37d-9fd6","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8624.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8624.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8624","reference_id":"","reference_type":"","scores":[{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.8003","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80023","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80104","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80078","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80098","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80082","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80073","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80102","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80052","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80042","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01346","scoring_system":"epss","scoring_elements":"0.80069","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80366","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80372","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01383","scoring_system":"epss","scoring_elements":"0.80389","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8624"},{"reference_url":"https://curl.se/docs/CVE-2016-8624.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8624.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037192","reference_id":"1037192","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/"}],"url":"http://www.securitytracker.com/id/1037192"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388390","reference_id":"1388390","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388390"},{"reference_url":"http://www.securityfocus.com/bid/94103","reference_id":"94103","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/"}],"url":"http://www.securityfocus.com/bid/94103"},{"reference_url":"https://curl.haxx.se/docs/adv_20161102J.html","reference_id":"adv_20161102J.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/"}],"url":"https://curl.haxx.se/docs/adv_20161102J.html"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/"}],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5%40%3Ccommits.pulsar.apache.org%3E","reference_id":"rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5%40%3Ccommits.pulsar.apache.org%3E","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/"}],"url":"https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5%40%3Ccommits.pulsar.apache.org%3E"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624","reference_id":"show_bug.cgi?id=CVE-2016-8624","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:39:44Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8624"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370780?format=json","purl":"pkg:generic/curl.se/curl@7.51.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0"}],"aliases":["CVE-2016-8624"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e58m-g37d-9fd6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46647?format=json","vulnerability_id":"VCID-exhe-cmqf-duad","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which might allow remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2192.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2192.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2192","reference_id":"","reference_type":"","scores":[{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83933","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83795","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83808","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83823","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83825","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83849","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83855","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83872","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83866","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83861","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83894","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83895","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.8392","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02049","scoring_system":"epss","scoring_elements":"0.83928","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2192"},{"reference_url":"https://curl.se/docs/CVE-2011-2192.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2011-2192.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2192","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2192"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=631615","reference_id":"631615","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=631615"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=711454","reference_id":"711454","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=711454"},{"reference_url":"https://security.gentoo.org/glsa/201203-02","reference_id":"GLSA-201203-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201203-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0918","reference_id":"RHSA-2011:0918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0918"},{"reference_url":"https://usn.ubuntu.com/1158-1/","reference_id":"USN-1158-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1158-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370741?format=json","purl":"pkg:generic/curl.se/curl@7.21.7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4mcy-vzmg-mbhz"},{"vulnerability":"VCID-4mk9-5buz-puh5"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-87qu-j64w-p7fj"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bdrx-sm6b-sken"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c2na-7q9e-47am"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e1yx-dxa6-1bba"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-eer3-29q8-sbgq"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-prff-34kh-kbat"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sknq-8mm1-6qfe"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-z49y-v1gh-h7gj"},{"vulnerability":"VCID-z8h3-fdj8-xuaa"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.21.7"}],"aliases":["CVE-2011-2192"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-exhe-cmqf-duad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34707?format=json","vulnerability_id":"VCID-fnj3-2du1-4bhx","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3558","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2018:3558"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9586.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9586.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9586","reference_id":"","reference_type":"","scores":[{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75624","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.7562","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75582","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75596","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.7559","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75492","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75629","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75525","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75506","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75548","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75557","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75578","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75494","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9586"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9586"},{"reference_url":"https://curl.haxx.se/docs/adv_20161221A.html","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"}],"url":"https://curl.haxx.se/docs/adv_20161221A.html"},{"reference_url":"https://curl.se/docs/CVE-2016-9586.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-9586.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9586"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:N/I:N/A:P"},{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"}],"url":"https://github.com/curl/curl/commit/curl-7_51_0-162-g3ab3c16"},{"reference_url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"}],"url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"}],"url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"}],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"reference_url":"http://www.securityfocus.com/bid/95019","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"}],"url":"http://www.securityfocus.com/bid/95019"},{"reference_url":"http://www.securitytracker.com/id/1037515","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"}],"url":"http://www.securitytracker.com/id/1037515"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1406712","reference_id":"1406712","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1406712"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848958","reference_id":"848958","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848958"},{"reference_url":"https://security.archlinux.org/ASA-201612-22","reference_id":"ASA-201612-22","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201612-22"},{"reference_url":"https://security.archlinux.org/ASA-201701-10","reference_id":"ASA-201701-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-10"},{"reference_url":"https://security.archlinux.org/ASA-201701-11","reference_id":"ASA-201701-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-11"},{"reference_url":"https://security.archlinux.org/ASA-201701-7","reference_id":"ASA-201701-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-7"},{"reference_url":"https://security.archlinux.org/ASA-201701-8","reference_id":"ASA-201701-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-8"},{"reference_url":"https://security.archlinux.org/ASA-201701-9","reference_id":"ASA-201701-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-9"},{"reference_url":"https://security.archlinux.org/AVG-112","reference_id":"AVG-112","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-112"},{"reference_url":"https://security.archlinux.org/AVG-113","reference_id":"AVG-113","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-113"},{"reference_url":"https://security.archlinux.org/AVG-114","reference_id":"AVG-114","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-114"},{"reference_url":"https://security.archlinux.org/AVG-115","reference_id":"AVG-115","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-115"},{"reference_url":"https://security.archlinux.org/AVG-116","reference_id":"AVG-116","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-116"},{"reference_url":"https://security.archlinux.org/AVG-117","reference_id":"AVG-117","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-117"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-9586","reference_id":"CVE-2016-9586","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-9586"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T21:03:41Z/"}],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://usn.ubuntu.com/3441-1/","reference_id":"USN-3441-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3441-1/"},{"reference_url":"https://usn.ubuntu.com/3441-2/","reference_id":"USN-3441-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3441-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370781?format=json","purl":"pkg:generic/curl.se/curl@7.52.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-36n6-qanf-nue8"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dhrf-2sz5-3bhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-hyqp-z8hb-fqbt"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-q3hu-8uy5-e3a4"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.52.0"}],"aliases":["CVE-2016-9586"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fnj3-2du1-4bhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61667?format=json","vulnerability_id":"VCID-ggt7-eejg-xfb6","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22876.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22876.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22876","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21003","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21131","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21078","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20928","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20925","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20987","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20845","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30201","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29849","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29919","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30034","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30106","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30149","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30169","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30153","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22876"},{"reference_url":"https://curl.se/docs/CVE-2021-22876.html","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"}],"url":"https://curl.se/docs/CVE-2021-22876.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1101882","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"}],"url":"https://hackerone.com/reports/1101882"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1941964","reference_id":"1941964","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1941964"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/","reference_id":"2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986269","reference_id":"986269","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986269"},{"reference_url":"https://security.archlinux.org/AVG-1753","reference_id":"AVG-1753","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1753"},{"reference_url":"https://security.archlinux.org/AVG-1754","reference_id":"AVG-1754","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1754"},{"reference_url":"https://security.archlinux.org/AVG-1755","reference_id":"AVG-1755","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1755"},{"reference_url":"https://security.archlinux.org/AVG-1756","reference_id":"AVG-1756","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1756"},{"reference_url":"https://security.archlinux.org/AVG-1757","reference_id":"AVG-1757","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1757"},{"reference_url":"https://security.archlinux.org/AVG-1758","reference_id":"AVG-1758","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1758"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22876","reference_id":"CVE-2021-22876","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22876"},{"reference_url":"https://security.gentoo.org/glsa/202105-36","reference_id":"GLSA-202105-36","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"}],"url":"https://security.gentoo.org/glsa/202105-36"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/","reference_id":"ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/","reference_id":"KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html","reference_id":"msg00019.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/05/msg00019.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210521-0007/","reference_id":"ntap-20210521-0007","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:54:20Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210521-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2471","reference_id":"RHSA-2021:2471","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2471"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2472","reference_id":"RHSA-2021:2472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2472"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4511","reference_id":"RHSA-2021:4511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1354","reference_id":"RHSA-2022:1354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1354"},{"reference_url":"https://usn.ubuntu.com/4898-1/","reference_id":"USN-4898-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4898-1/"},{"reference_url":"https://usn.ubuntu.com/4903-1/","reference_id":"USN-4903-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4903-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370817?format=json","purl":"pkg:generic/curl.se/curl@7.76.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-38mv-usbe-z7hd"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bdy2-8gub-tfe6"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-d3s1-3qs7-2uhw"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-gv7x-j8bz-wycc"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t1fk-cbsx-j3gh"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-t8t6-9wa3-aub7"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xzay-sjpy-3yce"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.76.0"}],"aliases":["CVE-2021-22876"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ggt7-eejg-xfb6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/19507?format=json","vulnerability_id":"VCID-gnx2-djyk-uyaf","summary":"Cookie injection with none file\nThis flaw allows an attacker to insert cookies at will into a running program\nusing libcurl, if the specific series of conditions are met.\n\nlibcurl performs transfers. In its API, an application creates \"easy handles\"\nthat are the individual handles for single transfers.\n\nlibcurl provides a function call that duplicates en easy handle called\n[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).\n\nIf a transfer has cookies enabled when the handle is duplicated, the\ncookie-enable state is also cloned - but without cloning the actual\ncookies. If the source handle does not read any cookies from a specific file on\ndisk, the cloned version of the handle would instead store the file name as\n`none` (using the four ASCII letters, no quotes).\n\nSubsequent use of the cloned handle that does not explicitly set a source to\nload cookies from would then inadvertently load cookies from a file named\n`none` - if such a file exists and is readable in the current directory of the\nprogram using libcurl. And if using the correct file format of course.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38546.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38546.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38546","reference_id":"","reference_type":"","scores":[{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.4895","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48964","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48991","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48944","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48998","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48995","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49012","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48985","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49036","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49032","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48994","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49733","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-38546"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38545"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38546"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/2148242","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/2148242"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241938","reference_id":"2241938","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2241938"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/34","reference_id":"34","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/34"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/37","reference_id":"37","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/37"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/38","reference_id":"38","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/38"},{"reference_url":"https://security.archlinux.org/AVG-2845","reference_id":"AVG-2845","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2845"},{"reference_url":"https://security.archlinux.org/AVG-2846","reference_id":"AVG-2846","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2846"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38546","reference_id":"CVE-2023-38546","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38546"},{"reference_url":"https://curl.se/docs/CVE-2023-38546.html","reference_id":"CVE-2023-38546.HTML","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"https://curl.se/docs/CVE-2023-38546.html"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://support.apple.com/kb/HT214036","reference_id":"HT214036","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"https://support.apple.com/kb/HT214036"},{"reference_url":"https://support.apple.com/kb/HT214057","reference_id":"HT214057","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"https://support.apple.com/kb/HT214057"},{"reference_url":"https://support.apple.com/kb/HT214058","reference_id":"HT214058","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"https://support.apple.com/kb/HT214058"},{"reference_url":"https://support.apple.com/kb/HT214063","reference_id":"HT214063","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"https://support.apple.com/kb/HT214063"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/","reference_id":"OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5700","reference_id":"RHSA-2023:5700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5763","reference_id":"RHSA-2023:5763","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5763"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6292","reference_id":"RHSA-2023:6292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6745","reference_id":"RHSA-2023:6745","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6745"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7540","reference_id":"RHSA-2023:7540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7625","reference_id":"RHSA-2023:7625","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7625"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7626","reference_id":"RHSA-2023:7626","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7626"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1601","reference_id":"RHSA-2024:1601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2092","reference_id":"RHSA-2024:2092","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2092"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2093","reference_id":"RHSA-2024:2093","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2093"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2101","reference_id":"RHSA-2024:2101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2101"},{"reference_url":"https://usn.ubuntu.com/6429-1/","reference_id":"USN-6429-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6429-1/"},{"reference_url":"https://usn.ubuntu.com/6429-2/","reference_id":"USN-6429-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6429-2/"},{"reference_url":"https://usn.ubuntu.com/6429-3/","reference_id":"USN-6429-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6429-3/"},{"reference_url":"https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868","reference_id":"viewtopic.php?f=8&t=8868","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:01:53Z/"}],"url":"https://forum.vmssoftware.com/viewtopic.php?f=8&t=8868"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370842?format=json","purl":"pkg:generic/curl.se/curl@8.4.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tha5-fv3w-sub6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.4.0"}],"aliases":["CVE-2023-38546"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gnx2-djyk-uyaf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49261?format=json","vulnerability_id":"VCID-hudt-78dw-tkf2","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22925.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22925","reference_id":"","reference_type":"","scores":[{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.55005","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.5489","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.55017","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.5496","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54986","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54956","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.55006","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62217","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62173","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62194","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62228","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62207","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62224","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62235","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62218","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22925"},{"reference_url":"https://curl.se/docs/CVE-2021-22925.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2021-22925.html"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1223882","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"}],"url":"https://hackerone.com/reports/1223882"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1970902","reference_id":"1970902","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1970902"},{"reference_url":"http://seclists.org/fulldisclosure/2021/Sep/39","reference_id":"39","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"}],"url":"http://seclists.org/fulldisclosure/2021/Sep/39"},{"reference_url":"http://seclists.org/fulldisclosure/2021/Sep/40","reference_id":"40","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"}],"url":"http://seclists.org/fulldisclosure/2021/Sep/40"},{"reference_url":"https://security.archlinux.org/ASA-202107-59","reference_id":"ASA-202107-59","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-59"},{"reference_url":"https://security.archlinux.org/ASA-202107-60","reference_id":"ASA-202107-60","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-60"},{"reference_url":"https://security.archlinux.org/ASA-202107-61","reference_id":"ASA-202107-61","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-61"},{"reference_url":"https://security.archlinux.org/ASA-202107-62","reference_id":"ASA-202107-62","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-62"},{"reference_url":"https://security.archlinux.org/ASA-202107-63","reference_id":"ASA-202107-63","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-63"},{"reference_url":"https://security.archlinux.org/ASA-202107-64","reference_id":"ASA-202107-64","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-64"},{"reference_url":"https://security.archlinux.org/AVG-2194","reference_id":"AVG-2194","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2194"},{"reference_url":"https://security.archlinux.org/AVG-2195","reference_id":"AVG-2195","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2195"},{"reference_url":"https://security.archlinux.org/AVG-2196","reference_id":"AVG-2196","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2196"},{"reference_url":"https://security.archlinux.org/AVG-2197","reference_id":"AVG-2197","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2197"},{"reference_url":"https://security.archlinux.org/AVG-2198","reference_id":"AVG-2198","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2198"},{"reference_url":"https://security.archlinux.org/AVG-2199","reference_id":"AVG-2199","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2199"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/","reference_id":"FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://support.apple.com/kb/HT212804","reference_id":"HT212804","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"}],"url":"https://support.apple.com/kb/HT212804"},{"reference_url":"https://support.apple.com/kb/HT212805","reference_id":"HT212805","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"}],"url":"https://support.apple.com/kb/HT212805"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210902-0003/","reference_id":"ntap-20210902-0003","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210902-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4511","reference_id":"RHSA-2021:4511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4511"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf","reference_id":"ssa-484086.pdf","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T16:36:17Z/"}],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf"},{"reference_url":"https://usn.ubuntu.com/5021-1/","reference_id":"USN-5021-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5021-1/"},{"reference_url":"https://usn.ubuntu.com/5021-2/","reference_id":"USN-5021-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5021-2/"},{"reference_url":"https://usn.ubuntu.com/5894-1/","reference_id":"USN-5894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5894-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370820?format=json","purl":"pkg:generic/curl.se/curl@7.78.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bdy2-8gub-tfe6"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-ej47-4dcu-5fhy"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-gv7x-j8bz-wycc"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t1fk-cbsx-j3gh"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-t8t6-9wa3-aub7"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-xzay-sjpy-3yce"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.78.0"}],"aliases":["CVE-2021-22925"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hudt-78dw-tkf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34692?format=json","vulnerability_id":"VCID-jeqg-g3en-5udw","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5420.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5420.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5420","reference_id":"","reference_type":"","scores":[{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77847","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77991","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.7797","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77977","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77854","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77882","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77864","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77891","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77896","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77923","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77907","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77906","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77944","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77943","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77937","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5420"},{"reference_url":"https://curl.se/docs/CVE-2016-5420.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-5420.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1362190","reference_id":"1362190","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1362190"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2575","reference_id":"RHSA-2016:2575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2957","reference_id":"RHSA-2016:2957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2957"},{"reference_url":"https://usn.ubuntu.com/3048-1/","reference_id":"USN-3048-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3048-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370777?format=json","purl":"pkg:generic/curl.se/curl@7.50.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.50.1"}],"aliases":["CVE-2016-5420"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jeqg-g3en-5udw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34702?format=json","vulnerability_id":"VCID-jqqf-gmd3-ubcd","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8621.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8621.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8621","reference_id":"","reference_type":"","scores":[{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84627","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84539","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84639","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84622","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84638","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84617","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84555","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84576","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.8458","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84601","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0226","scoring_system":"epss","scoring_elements":"0.84608","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02369","scoring_system":"epss","scoring_elements":"0.84974","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03233","scoring_system":"epss","scoring_elements":"0.87113","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03233","scoring_system":"epss","scoring_elements":"0.87106","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03233","scoring_system":"epss","scoring_elements":"0.87112","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8621"},{"reference_url":"https://curl.se/docs/CVE-2016-8621.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8621.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037192","reference_id":"1037192","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/"}],"url":"http://www.securitytracker.com/id/1037192"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388385","reference_id":"1388385","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388385"},{"reference_url":"http://www.securityfocus.com/bid/94101","reference_id":"94101","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/"}],"url":"http://www.securityfocus.com/bid/94101"},{"reference_url":"https://curl.haxx.se/docs/adv_20161102G.html","reference_id":"adv_20161102G.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/"}],"url":"https://curl.haxx.se/docs/adv_20161102G.html"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://curl.haxx.se/CVE-2016-8621.patch","reference_id":"CVE-2016-8621.patch","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/"}],"url":"https://curl.haxx.se/CVE-2016-8621.patch"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/"}],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621","reference_id":"show_bug.cgi?id=CVE-2016-8621","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:33:21Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8621"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370780?format=json","purl":"pkg:generic/curl.se/curl@7.51.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0"}],"aliases":["CVE-2016-8621"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jqqf-gmd3-ubcd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34700?format=json","vulnerability_id":"VCID-jtw4-af4y-nkbk","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8619.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8619.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8619","reference_id":"","reference_type":"","scores":[{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86359","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86466","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86432","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.8643","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86425","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86441","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86446","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.8644","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86459","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86469","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.8637","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86387","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86389","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86408","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02935","scoring_system":"epss","scoring_elements":"0.86418","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8619"},{"reference_url":"https://curl.se/docs/CVE-2016-8619.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8619.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388379","reference_id":"1388379","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388379"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370780?format=json","purl":"pkg:generic/curl.se/curl@7.51.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0"}],"aliases":["CVE-2016-8619"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jtw4-af4y-nkbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34695?format=json","vulnerability_id":"VCID-k8kj-q1je-f7bt","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7167.json","reference_id":"","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7167.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7167","reference_id":"","reference_type":"","scores":[{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84631","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84765","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84727","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84729","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84756","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84766","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84646","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84666","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84667","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84689","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84696","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84715","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.8471","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84704","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02289","scoring_system":"epss","scoring_elements":"0.84726","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7167"},{"reference_url":"https://curl.se/docs/CVE-2016-7167.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-7167.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375906","reference_id":"1375906","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375906"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837945","reference_id":"837945","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837945"},{"reference_url":"https://security.archlinux.org/ASA-201609-18","reference_id":"ASA-201609-18","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-18"},{"reference_url":"https://security.archlinux.org/ASA-201609-19","reference_id":"ASA-201609-19","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-19"},{"reference_url":"https://security.archlinux.org/AVG-20","reference_id":"AVG-20","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-20"},{"reference_url":"https://security.archlinux.org/AVG-21","reference_id":"AVG-21","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-21"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2016","reference_id":"RHSA-2017:2016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2016"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370779?format=json","purl":"pkg:generic/curl.se/curl@7.50.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.50.3"}],"aliases":["CVE-2016-7167"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k8kj-q1je-f7bt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61669?format=json","vulnerability_id":"VCID-ph5u-5j8n-4qah","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22898.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22898.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22898","reference_id":"","reference_type":"","scores":[{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31806","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31849","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31791","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.3182","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31935","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31977","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31797","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31879","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31882","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31843","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31808","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.3184","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33263","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33283","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33183","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22898"},{"reference_url":"https://curl.se/docs/CVE-2021-22898.html","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"}],"url":"https://curl.se/docs/CVE-2021-22898.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1176461","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"}],"url":"https://hackerone.com/reports/1176461"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1964887","reference_id":"1964887","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1964887"},{"reference_url":"https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde","reference_id":"39ce47f219b09c380b81f89fe54ac586c8db6bde","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"}],"url":"https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/07/21/4","reference_id":"4","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"}],"url":"http://www.openwall.com/lists/oss-security/2021/07/21/4"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989228","reference_id":"989228","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989228"},{"reference_url":"https://security.archlinux.org/ASA-202106-4","reference_id":"ASA-202106-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-4"},{"reference_url":"https://security.archlinux.org/ASA-202106-5","reference_id":"ASA-202106-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-5"},{"reference_url":"https://security.archlinux.org/ASA-202106-6","reference_id":"ASA-202106-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-6"},{"reference_url":"https://security.archlinux.org/ASA-202106-7","reference_id":"ASA-202106-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-7"},{"reference_url":"https://security.archlinux.org/ASA-202106-8","reference_id":"ASA-202106-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-8"},{"reference_url":"https://security.archlinux.org/ASA-202106-9","reference_id":"ASA-202106-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202106-9"},{"reference_url":"https://security.archlinux.org/AVG-1995","reference_id":"AVG-1995","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1995"},{"reference_url":"https://security.archlinux.org/AVG-1996","reference_id":"AVG-1996","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1996"},{"reference_url":"https://security.archlinux.org/AVG-1997","reference_id":"AVG-1997","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1997"},{"reference_url":"https://security.archlinux.org/AVG-1998","reference_id":"AVG-1998","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1998"},{"reference_url":"https://security.archlinux.org/AVG-1999","reference_id":"AVG-1999","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1999"},{"reference_url":"https://security.archlinux.org/AVG-2000","reference_id":"AVG-2000","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2000"},{"reference_url":"https://www.debian.org/security/2022/dsa-5197","reference_id":"dsa-5197","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"}],"url":"https://www.debian.org/security/2022/dsa-5197"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/","reference_id":"FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/"},{"reference_url":"https://security.gentoo.org/glsa/202105-36","reference_id":"GLSA-202105-36","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202105-36"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/","reference_id":"POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-28T18:31:55Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4511","reference_id":"RHSA-2021:4511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4511"},{"reference_url":"https://usn.ubuntu.com/5021-1/","reference_id":"USN-5021-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5021-1/"},{"reference_url":"https://usn.ubuntu.com/5021-2/","reference_id":"USN-5021-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5021-2/"},{"reference_url":"https://usn.ubuntu.com/5894-1/","reference_id":"USN-5894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5894-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370819?format=json","purl":"pkg:generic/curl.se/curl@7.77.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bdy2-8gub-tfe6"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-ej47-4dcu-5fhy"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-gv7x-j8bz-wycc"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t1fk-cbsx-j3gh"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-t8t6-9wa3-aub7"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-xzay-sjpy-3yce"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.77.0"}],"aliases":["CVE-2021-22898"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ph5u-5j8n-4qah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41495?format=json","vulnerability_id":"VCID-prff-34kh-kbat","summary":"Multiple vulnerabilities have been found in cURL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"http://curl.haxx.se/docs/adv_20130412.html","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/docs/adv_20130412.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0771.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0771.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1944.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1944.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1944","reference_id":"","reference_type":"","scores":[{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85343","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85344","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85223","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85234","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85253","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85255","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85277","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85285","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85298","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85295","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85315","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85316","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85312","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02482","scoring_system":"epss","scoring_elements":"0.85335","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1944"},{"reference_url":"https://curl.se/docs/CVE-2013-1944.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2013-1944.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944"},{"reference_url":"http://secunia.com/advisories/53044","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/53044"},{"reference_url":"http://secunia.com/advisories/53051","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/53051"},{"reference_url":"http://secunia.com/advisories/53097","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/53097"},{"reference_url":"https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66"},{"reference_url":"https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121","reference_id":"","reference_type":"","scores":[],"url":"https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121"},{"reference_url":"http://www.debian.org/security/2012/dsa-2660","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2012/dsa-2660"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:151","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:151"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html"},{"reference_url":"http://www.osvdb.org/92316","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/92316"},{"reference_url":"http://www.securityfocus.com/bid/59058","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/59058"},{"reference_url":"http://www.ubuntu.com/usn/USN-1801-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1801-1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=705274","reference_id":"705274","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=705274"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=950577","reference_id":"950577","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=950577"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.1:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.1:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.1:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:6.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:6.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:-:lts:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1944","reference_id":"CVE-2013-1944","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1944"},{"reference_url":"https://security.gentoo.org/glsa/201401-14","reference_id":"GLSA-201401-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0771","reference_id":"RHSA-2013:0771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0771"},{"reference_url":"https://usn.ubuntu.com/1801-1/","reference_id":"USN-1801-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1801-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370752?format=json","purl":"pkg:generic/curl.se/curl@7.30.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4mk9-5buz-puh5"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-87qu-j64w-p7fj"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bdrx-sm6b-sken"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c2na-7q9e-47am"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-eer3-29q8-sbgq"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-ma8s-he6x-z7a8"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sknq-8mm1-6qfe"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ya9y-nav3-37hh"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-z49y-v1gh-h7gj"},{"vulnerability":"VCID-z8h3-fdj8-xuaa"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.30.0"}],"aliases":["CVE-2013-1944"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-prff-34kh-kbat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36349?format=json","vulnerability_id":"VCID-r3ny-7kn7-ukaa","summary":"An error in the X.509 certificate handling of cURL might enable remote\n    attackers to conduct man-in-the-middle attacks.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2417.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2417.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2417","reference_id":"","reference_type":"","scores":[{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91712","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91653","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91661","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91666","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91675","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91688","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91694","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91697","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.917","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91696","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91717","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.9171","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91716","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0733","scoring_system":"epss","scoring_elements":"0.91714","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2417"},{"reference_url":"https://curl.se/docs/CVE-2009-2417.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2009-2417.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=516181","reference_id":"516181","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=516181"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=541991","reference_id":"541991","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=541991"},{"reference_url":"https://security.gentoo.org/glsa/200909-20","reference_id":"GLSA-200909-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200909-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1209","reference_id":"RHSA-2009:1209","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1209"},{"reference_url":"https://usn.ubuntu.com/1158-1/","reference_id":"USN-1158-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1158-1/"},{"reference_url":"https://usn.ubuntu.com/818-1/","reference_id":"USN-818-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/818-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370730?format=json","purl":"pkg:generic/curl.se/curl@7.19.6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4mk9-5buz-puh5"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-87qu-j64w-p7fj"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-c2na-7q9e-47am"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dj5e-62rt-hkex"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e1yx-dxa6-1bba"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eer3-29q8-sbgq"},{"vulnerability":"VCID-exhe-cmqf-duad"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-prff-34kh-kbat"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sknq-8mm1-6qfe"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-z49y-v1gh-h7gj"},{"vulnerability":"VCID-z8h3-fdj8-xuaa"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.19.6"}],"aliases":["CVE-2009-2417"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r3ny-7kn7-ukaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49268?format=json","vulnerability_id":"VCID-r7bh-7wur-xffs","summary":"Multiple vulnerabilities have been found in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27776.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27776.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27776","reference_id":"","reference_type":"","scores":[{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71695","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71605","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71616","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71639","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71623","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71604","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71649","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71654","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71636","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71685","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.7169","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71574","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71592","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00682","scoring_system":"epss","scoring_elements":"0.71565","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-27776"},{"reference_url":"https://curl.se/docs/CVE-2022-27776.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2022-27776.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1547048","reference_id":"","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"}],"url":"https://hackerone.com/reports/1547048"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010252","reference_id":"1010252","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010252"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2078408","reference_id":"2078408","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2078408"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/","reference_id":"7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/"},{"reference_url":"https://security.archlinux.org/AVG-2685","reference_id":"AVG-2685","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2685"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/","reference_id":"DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/"},{"reference_url":"https://www.debian.org/security/2022/dsa-5197","reference_id":"dsa-5197","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"}],"url":"https://www.debian.org/security/2022/dsa-5197"},{"reference_url":"https://security.gentoo.org/glsa/202212-01","reference_id":"GLSA-202212-01","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"}],"url":"https://security.gentoo.org/glsa/202212-01"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220609-0008/","reference_id":"ntap-20220609-0008","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T15:23:04Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220609-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5245","reference_id":"RHSA-2022:5245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5313","reference_id":"RHSA-2022:5313","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5313"},{"reference_url":"https://usn.ubuntu.com/5397-1/","reference_id":"USN-5397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5397-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370826?format=json","purl":"pkg:generic/curl.se/curl@7.83.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-6ge5-86tg-dydf"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-ej47-4dcu-5fhy"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-gv7x-j8bz-wycc"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-hjkx-6yep-mkde"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-m15r-v9sr-2bbn"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rhxh-77pj-1bfy"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t1fk-cbsx-j3gh"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v9n1-d6xt-6ubn"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-xzay-sjpy-3yce"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.83.0"}],"aliases":["CVE-2022-27776"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r7bh-7wur-xffs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50087?format=json","vulnerability_id":"VCID-rmez-cwu2-2ya7","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could result in information disclosure or data loss.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8284.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-8284.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8284","reference_id":"","reference_type":"","scores":[{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.27969","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28391","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.283","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28321","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28408","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28411","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28368","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2831","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28466","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28508","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28364","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28543","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28767","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28655","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-8284"},{"reference_url":"https://curl.se/docs/CVE-2020-8284.html","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"}],"url":"https://curl.se/docs/CVE-2020-8284.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8169"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8231"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22876"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22890"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1040166","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"}],"url":"https://hackerone.com/reports/1040166"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1902667","reference_id":"1902667","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1902667"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977163","reference_id":"977163","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977163"},{"reference_url":"https://security.archlinux.org/AVG-1337","reference_id":"AVG-1337","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1337"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/","reference_id":"DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/"},{"reference_url":"https://www.debian.org/security/2021/dsa-4881","reference_id":"dsa-4881","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"}],"url":"https://www.debian.org/security/2021/dsa-4881"},{"reference_url":"https://security.gentoo.org/glsa/202012-14","reference_id":"GLSA-202012-14","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"}],"url":"https://security.gentoo.org/glsa/202012-14"},{"reference_url":"https://support.apple.com/kb/HT212325","reference_id":"HT212325","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"}],"url":"https://support.apple.com/kb/HT212325"},{"reference_url":"https://support.apple.com/kb/HT212326","reference_id":"HT212326","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"}],"url":"https://support.apple.com/kb/HT212326"},{"reference_url":"https://support.apple.com/kb/HT212327","reference_id":"HT212327","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"}],"url":"https://support.apple.com/kb/HT212327"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html","reference_id":"msg00029.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/12/msg00029.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210122-0007/","reference_id":"ntap-20210122-0007","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210122-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/","reference_id":"NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:56:25Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1610","reference_id":"RHSA-2021:1610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2471","reference_id":"RHSA-2021:2471","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2471"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2472","reference_id":"RHSA-2021:2472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2472"},{"reference_url":"https://usn.ubuntu.com/4665-1/","reference_id":"USN-4665-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4665-1/"},{"reference_url":"https://usn.ubuntu.com/4665-2/","reference_id":"USN-4665-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4665-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370815?format=json","purl":"pkg:generic/curl.se/curl@7.74.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bdy2-8gub-tfe6"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-d3s1-3qs7-2uhw"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-frgg-29yv-dyf7"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-gv7x-j8bz-wycc"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t1fk-cbsx-j3gh"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-t8t6-9wa3-aub7"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xzay-sjpy-3yce"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.74.0"}],"aliases":["CVE-2020-8284"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rmez-cwu2-2ya7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57269?format=json","vulnerability_id":"VCID-s73y-y7v7-43cm","summary":"Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28322.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28322.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28322","reference_id":"","reference_type":"","scores":[{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68992","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68981","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.6893","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68987","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70255","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70238","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70341","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70331","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70289","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70302","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70317","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70294","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70278","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70232","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-28322"},{"reference_url":"https://curl.se/docs/CVE-2023-28322.html","reference_id":"","reference_type":"","scores":[{"value":"Low","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2023-28322.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28322","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28322"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1954658","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://hackerone.com/reports/1954658"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239","reference_id":"1036239","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036239"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196793","reference_id":"2196793","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2196793"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/47","reference_id":"47","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/47"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/48","reference_id":"48","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/48"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/52","reference_id":"52","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/52"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/","reference_id":"F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/"},{"reference_url":"https://security.gentoo.org/glsa/202310-12","reference_id":"GLSA-202310-12","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://security.gentoo.org/glsa/202310-12"},{"reference_url":"https://support.apple.com/kb/HT213843","reference_id":"HT213843","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://support.apple.com/kb/HT213843"},{"reference_url":"https://support.apple.com/kb/HT213844","reference_id":"HT213844","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://support.apple.com/kb/HT213844"},{"reference_url":"https://support.apple.com/kb/HT213845","reference_id":"HT213845","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://support.apple.com/kb/HT213845"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230609-0009/","reference_id":"ntap-20230609-0009","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230609-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4354","reference_id":"RHSA-2023:4354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4354"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4628","reference_id":"RHSA-2023:4628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4629","reference_id":"RHSA-2023:4629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5598","reference_id":"RHSA-2023:5598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0428","reference_id":"RHSA-2024:0428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0585","reference_id":"RHSA-2024:0585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0585"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1601","reference_id":"RHSA-2024:1601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2092","reference_id":"RHSA-2024:2092","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2092"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2093","reference_id":"RHSA-2024:2093","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2093"},{"reference_url":"https://usn.ubuntu.com/6237-1/","reference_id":"USN-6237-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6237-1/"},{"reference_url":"https://usn.ubuntu.com/6237-3/","reference_id":"USN-6237-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6237-3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/","reference_id":"Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T19:43:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370836?format=json","purl":"pkg:generic/curl.se/curl@8.1.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-4seq-hvbx-7fg8"},{"vulnerability":"VCID-5xp7-mcsa-uqd4"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bz4u-6rft-s3a8"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-tha5-fv3w-sub6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.1.0"}],"aliases":["CVE-2023-28322"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s73y-y7v7-43cm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57750?format=json","vulnerability_id":"VCID-sknq-8mm1-6qfe","summary":"security update","references":[{"reference_url":"http://curl.haxx.se/docs/adv_20140910A.html","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/docs/adv_20140910A.html"},{"reference_url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743","reference_id":"","reference_type":"","scores":[],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743"},{"reference_url":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00024.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-1254.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-1254.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3613.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3613.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3613","reference_id":"","reference_type":"","scores":[{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.8294","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82936","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82801","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82817","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.8283","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82826","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82851","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82858","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82874","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82868","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82864","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82903","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82905","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0182","scoring_system":"epss","scoring_elements":"0.82926","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3613"},{"reference_url":"https://curl.se/docs/CVE-2014-3613.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2014-3613.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613"},{"reference_url":"https://support.apple.com/kb/HT205031","reference_id":"","reference_type":"","scores":[],"url":"https://support.apple.com/kb/HT205031"},{"reference_url":"http://www.debian.org/security/2014/dsa-3022","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3022"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/69748","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69748"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1136154","reference_id":"1136154","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1136154"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.32.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.33.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.34.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.35.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.36.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:7.37.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.31.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.32.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.33.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.34.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.35.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.36.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:libcurl:7.37.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3613","reference_id":"CVE-2014-3613","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3613"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1254","reference_id":"RHSA-2015:1254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1254"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2159","reference_id":"RHSA-2015:2159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2159"},{"reference_url":"https://usn.ubuntu.com/2346-1/","reference_id":"USN-2346-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2346-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370761?format=json","purl":"pkg:generic/curl.se/curl@7.38.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bgtv-jrna-9yb3"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-eer3-29q8-sbgq"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qka4-jfdb-w3d5"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-t753-w1ha-kqaz"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wh98-pw9h-cyfx"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.38.0"}],"aliases":["CVE-2014-3613"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sknq-8mm1-6qfe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/158821?format=json","vulnerability_id":"VCID-snaz-pg1h-8kew","summary":"cURL before 7.47.0 on Windows allows attackers to write to arbitrary files in the current working directory on a different drive via a colon in a remote file name.","references":[{"reference_url":"http://curl.haxx.se/docs/adv_20160127B.html","reference_id":"","reference_type":"","scores":[],"url":"http://curl.haxx.se/docs/adv_20160127B.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0754","reference_id":"","reference_type":"","scores":[{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57494","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57495","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57515","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57423","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57507","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57528","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57504","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57556","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.5756","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57575","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57555","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57533","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57561","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57557","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57537","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0754"},{"reference_url":"https://curl.se/docs/CVE-2016-0754.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-0754.html"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0754","reference_id":"CVE-2016-0754","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0754"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370771?format=json","purl":"pkg:generic/curl.se/curl@7.47.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bgtv-jrna-9yb3"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.47.0"}],"aliases":["CVE-2016-0754"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-snaz-pg1h-8kew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/355415?format=json","vulnerability_id":"VCID-sshs-1k6e-cqer","summary":"","references":[{"reference_url":"https://curl.se/docs/CVE-2026-7168.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2026-7168.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-7168","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-7168"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/3697719","reference_id":"","reference_type":"","scores":[],"url":"https://hackerone.com/reports/3697719"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1088653?format=json","purl":"pkg:generic/curl.se/curl@8.20.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@8.20.0"}],"aliases":["CVE-2026-7168"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sshs-1k6e-cqer"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39487?format=json","vulnerability_id":"VCID-tmv3-fzje-sbck","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which can allow remote attackers to cause Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3148.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3148.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3148","reference_id":"","reference_type":"","scores":[{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82284","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82137","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.8215","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82172","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82168","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82195","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82202","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82221","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82214","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82208","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82244","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82245","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82268","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01686","scoring_system":"epss","scoring_elements":"0.82279","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3148"},{"reference_url":"https://curl.se/docs/CVE-2015-3148.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2015-3148.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1213351","reference_id":"1213351","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1213351"},{"reference_url":"https://security.gentoo.org/glsa/201509-02","reference_id":"GLSA-201509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201509-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1254","reference_id":"RHSA-2015:1254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1254"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2159","reference_id":"RHSA-2015:2159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2159"},{"reference_url":"https://usn.ubuntu.com/2591-1/","reference_id":"USN-2591-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2591-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370765?format=json","purl":"pkg:generic/curl.se/curl@7.42.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bgtv-jrna-9yb3"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-r447-deb8-2ydj"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yubp-g4rt-c3e6"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.42.0"}],"aliases":["CVE-2015-3148"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tmv3-fzje-sbck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34696?format=json","vulnerability_id":"VCID-vxpj-xygq-9be2","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8615.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8615.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8615","reference_id":"","reference_type":"","scores":[{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84774","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84871","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84857","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84854","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84849","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.8487","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84789","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84808","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.8481","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84832","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84839","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03112","scoring_system":"epss","scoring_elements":"0.86847","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04231","scoring_system":"epss","scoring_elements":"0.88808","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04231","scoring_system":"epss","scoring_elements":"0.88802","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04231","scoring_system":"epss","scoring_elements":"0.88809","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8615"},{"reference_url":"https://curl.se/docs/CVE-2016-8615.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8615.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037192","reference_id":"1037192","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/"}],"url":"http://www.securitytracker.com/id/1037192"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388370","reference_id":"1388370","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388370"},{"reference_url":"http://www.securityfocus.com/bid/94096","reference_id":"94096","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/"}],"url":"http://www.securityfocus.com/bid/94096"},{"reference_url":"https://curl.haxx.se/docs/adv_20161102A.html","reference_id":"adv_20161102A.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/"}],"url":"https://curl.haxx.se/docs/adv_20161102A.html"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://curl.haxx.se/CVE-2016-8615.patch","reference_id":"CVE-2016-8615.patch","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/"}],"url":"https://curl.haxx.se/CVE-2016-8615.patch"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/"}],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615","reference_id":"show_bug.cgi?id=CVE-2016-8615","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:35:21Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8615"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370780?format=json","purl":"pkg:generic/curl.se/curl@7.51.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0"}],"aliases":["CVE-2016-8615"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vxpj-xygq-9be2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34699?format=json","vulnerability_id":"VCID-vyk2-s5ut-ubbz","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8618.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8618.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8618","reference_id":"","reference_type":"","scores":[{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.81967","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82107","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82033","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82068","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82069","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.8207","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82092","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82104","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.81978","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82001","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.81997","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82024","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82031","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.82051","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01654","scoring_system":"epss","scoring_elements":"0.8204","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8618"},{"reference_url":"https://curl.se/docs/CVE-2016-8618.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8618.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388378","reference_id":"1388378","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388378"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370780?format=json","purl":"pkg:generic/curl.se/curl@7.51.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0"}],"aliases":["CVE-2016-8618"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vyk2-s5ut-ubbz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/161813?format=json","vulnerability_id":"VCID-wc8j-qyp4-tqbd","summary":"Multiple untrusted search path vulnerabilities in cURL and libcurl before 7.49.1, when built with SSPI or telnet is enabled, allow local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse (1) security.dll, (2) secur32.dll, or (3) ws2_32.dll in the application or current working directory.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4802","reference_id":"","reference_type":"","scores":[{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69897","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69885","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69894","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.6974","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69751","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69767","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69743","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69791","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69807","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.6983","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69815","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.698","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69842","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69852","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00612","scoring_system":"epss","scoring_elements":"0.69833","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4802"},{"reference_url":"https://curl.haxx.se/docs/adv_20160530.html","reference_id":"","reference_type":"","scores":[],"url":"https://curl.haxx.se/docs/adv_20160530.html"},{"reference_url":"https://curl.se/docs/CVE-2016-4802.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-4802.html"},{"reference_url":"http://www.securityfocus.com/bid/90997","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/90997"},{"reference_url":"http://www.securitytracker.com/id/1036008","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036008"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4802","reference_id":"CVE-2016-4802","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4802"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370775?format=json","purl":"pkg:generic/curl.se/curl@7.49.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bgtv-jrna-9yb3"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.49.1"}],"aliases":["CVE-2016-4802"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wc8j-qyp4-tqbd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39484?format=json","vulnerability_id":"VCID-xspf-45t1-2uhf","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which can allow remote attackers to cause Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3143.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3143.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3143","reference_id":"","reference_type":"","scores":[{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87591","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.875","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.8751","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87524","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87526","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87545","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87552","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87563","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87559","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87556","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.8757","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87571","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87569","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87586","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03475","scoring_system":"epss","scoring_elements":"0.87593","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3143"},{"reference_url":"https://curl.se/docs/CVE-2015-3143.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2015-3143.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1213306","reference_id":"1213306","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1213306"},{"reference_url":"https://security.gentoo.org/glsa/201509-02","reference_id":"GLSA-201509-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201509-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1254","reference_id":"RHSA-2015:1254","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1254"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2159","reference_id":"RHSA-2015:2159","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2159"},{"reference_url":"https://usn.ubuntu.com/2591-1/","reference_id":"USN-2591-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2591-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370765?format=json","purl":"pkg:generic/curl.se/curl@7.42.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bgtv-jrna-9yb3"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-r447-deb8-2ydj"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yubp-g4rt-c3e6"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.42.0"}],"aliases":["CVE-2015-3143"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xspf-45t1-2uhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/11000?format=json","vulnerability_id":"VCID-y32p-52ps-4ug4","summary":"Use of Incorrectly-Resolved Name or Reference\nlibcurl keeps previously used connections in a connection pool for subsequent transfers to reuse, if one of them matches the setup. Due to errors in the logic, the config matching function does not take `issuercert` into account and it compared the involved paths *case insensitively*, which could lead to libcurl reusing wrong connections. File paths are, or can be, case sensitive on many systems but not all, and can even vary depending on used file systems. The comparison also didn't include the `issuer cert` which a transfer can set to qualify how to verify the server certificate.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22924.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22924.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22924","reference_id":"","reference_type":"","scores":[{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73012","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73042","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.7316","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73161","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73147","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.7311","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73117","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73107","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73016","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73021","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73053","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73066","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73064","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.73091","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00746","scoring_system":"epss","scoring_elements":"0.7307","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-22924"},{"reference_url":"https://curl.se/docs/CVE-2021-22924.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2021-22924.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22898"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22924"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22945"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22946"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32208"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://hackerone.com/reports/1223565","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://hackerone.com/reports/1223565"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1981460","reference_id":"1981460","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1981460"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991492","reference_id":"991492","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991492"},{"reference_url":"https://security.archlinux.org/ASA-202107-59","reference_id":"ASA-202107-59","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-59"},{"reference_url":"https://security.archlinux.org/ASA-202107-60","reference_id":"ASA-202107-60","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-60"},{"reference_url":"https://security.archlinux.org/ASA-202107-61","reference_id":"ASA-202107-61","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-61"},{"reference_url":"https://security.archlinux.org/ASA-202107-62","reference_id":"ASA-202107-62","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-62"},{"reference_url":"https://security.archlinux.org/ASA-202107-63","reference_id":"ASA-202107-63","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-63"},{"reference_url":"https://security.archlinux.org/ASA-202107-64","reference_id":"ASA-202107-64","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202107-64"},{"reference_url":"https://security.archlinux.org/AVG-2194","reference_id":"AVG-2194","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2194"},{"reference_url":"https://security.archlinux.org/AVG-2195","reference_id":"AVG-2195","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2195"},{"reference_url":"https://security.archlinux.org/AVG-2196","reference_id":"AVG-2196","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2196"},{"reference_url":"https://security.archlinux.org/AVG-2197","reference_id":"AVG-2197","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2197"},{"reference_url":"https://security.archlinux.org/AVG-2198","reference_id":"AVG-2198","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2198"},{"reference_url":"https://security.archlinux.org/AVG-2199","reference_id":"AVG-2199","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2199"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22924","reference_id":"CVE-2021-22924","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-22924"},{"reference_url":"https://www.debian.org/security/2022/dsa-5197","reference_id":"dsa-5197","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://www.debian.org/security/2022/dsa-5197"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/","reference_id":"FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/08/msg00017.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00017.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210902-0003/","reference_id":"ntap-20210902-0003","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210902-0003/"},{"reference_url":"https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E","reference_id":"r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E","reference_id":"r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E","reference_id":"rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E","reference_id":"rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3582","reference_id":"RHSA-2021:3582","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3582"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1354","reference_id":"RHSA-2022:1354","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1354"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf","reference_id":"ssa-484086.pdf","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf","reference_id":"ssa-732250.pdf","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-27T19:35:55Z/"}],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf"},{"reference_url":"https://usn.ubuntu.com/5021-1/","reference_id":"USN-5021-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5021-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370820?format=json","purl":"pkg:generic/curl.se/curl@7.78.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4e1k-7bj9-hfch"},{"vulnerability":"VCID-4gze-cwtp-2bgr"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bdy2-8gub-tfe6"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-ej47-4dcu-5fhy"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-gv7x-j8bz-wycc"},{"vulnerability":"VCID-hayq-ra35-myf3"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n57n-cymy-z7dr"},{"vulnerability":"VCID-nvzd-v3bs-6qek"},{"vulnerability":"VCID-pwn6-j8vf-rufk"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpux-jh6k-8qhx"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t1fk-cbsx-j3gh"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-t8t6-9wa3-aub7"},{"vulnerability":"VCID-t9p4-2x7v-yfaq"},{"vulnerability":"VCID-tcqe-7skm-b3fz"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-vbbv-k1r7-kkas"},{"vulnerability":"VCID-wgma-bycg-1qb1"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xpss-yndr-mycj"},{"vulnerability":"VCID-xzay-sjpy-3yce"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-yaas-j3qk-kfdg"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.78.0"}],"aliases":["CVE-2021-22924"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y32p-52ps-4ug4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34706?format=json","vulnerability_id":"VCID-yxks-8529-23bj","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8625.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8625.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8625","reference_id":"","reference_type":"","scores":[{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81219","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81356","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81278","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81283","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81304","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.8129","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.8132","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81322","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81344","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81351","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81228","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81251","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.8125","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8625"},{"reference_url":"https://curl.se/docs/CVE-2016-8625.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8625.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8625"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388392","reference_id":"1388392","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388392"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-47"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370780?format=json","purl":"pkg:generic/curl.se/curl@7.51.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0"}],"aliases":["CVE-2016-8625"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yxks-8529-23bj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41496?format=json","vulnerability_id":"VCID-z49y-v1gh-h7gj","summary":"Multiple vulnerabilities have been found in cURL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2174.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2174.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2174","reference_id":"","reference_type":"","scores":[{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.87008","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86912","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86923","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86942","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86936","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86956","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86963","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86977","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86971","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86966","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86981","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86985","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.86983","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.87001","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03181","scoring_system":"epss","scoring_elements":"0.87006","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2174"},{"reference_url":"https://curl.se/docs/CVE-2013-2174.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2013-2174.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=965640","reference_id":"965640","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=965640"},{"reference_url":"https://security.gentoo.org/glsa/201401-14","reference_id":"GLSA-201401-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0983","reference_id":"RHSA-2013:0983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0983"},{"reference_url":"https://usn.ubuntu.com/1894-1/","reference_id":"USN-1894-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1894-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370753?format=json","purl":"pkg:generic/curl.se/curl@7.31.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-4mk9-5buz-puh5"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-87qu-j64w-p7fj"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bdrx-sm6b-sken"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c2na-7q9e-47am"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-eer3-29q8-sbgq"},{"vulnerability":"VCID-ekav-zg3k-v3ea"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-ma8s-he6x-z7a8"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sknq-8mm1-6qfe"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-t753-w1ha-kqaz"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wh98-pw9h-cyfx"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ya9y-nav3-37hh"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-z8h3-fdj8-xuaa"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.31.0"}],"aliases":["CVE-2013-2174"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z49y-v1gh-h7gj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51946?format=json","vulnerability_id":"VCID-z8h3-fdj8-xuaa","summary":"Multiple vulnerabilities have been discovered in cURL, the worst of\n    which could lead to man-in-the-middle attacks.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0138.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0138.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0138","reference_id":"","reference_type":"","scores":[{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71563","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71431","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71439","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71457","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71471","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71483","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71506","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.7149","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71472","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71517","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71522","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71501","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71551","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00676","scoring_system":"epss","scoring_elements":"0.71559","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0138"},{"reference_url":"https://curl.se/docs/CVE-2014-0138.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2014-0138.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1079148","reference_id":"1079148","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1079148"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742728","reference_id":"742728","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742728"},{"reference_url":"https://security.gentoo.org/glsa/201406-21","reference_id":"GLSA-201406-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-21"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0561","reference_id":"RHSA-2014:0561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0561"},{"reference_url":"https://usn.ubuntu.com/2167-1/","reference_id":"USN-2167-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2167-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370758?format=json","purl":"pkg:generic/curl.se/curl@7.36.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5jan-pqf6-fyhr"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6muy-xpdq-9kg8"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7c8e-eaqy-akeu"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-7xxh-66ys-4bhw"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a3v7-ptf1-6qgd"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-b2ef-zj3u-rbhy"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bgtv-jrna-9yb3"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-c6dk-7gj6-7far"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-dzzd-afgu-3fcy"},{"vulnerability":"VCID-e58m-g37d-9fd6"},{"vulnerability":"VCID-eap9-v2gp-fqgh"},{"vulnerability":"VCID-eer3-29q8-sbgq"},{"vulnerability":"VCID-ekav-zg3k-v3ea"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2cq-q3r9-jfcp"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jeqg-g3en-5udw"},{"vulnerability":"VCID-jqqf-gmd3-ubcd"},{"vulnerability":"VCID-jtw4-af4y-nkbk"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-k8kj-q1je-f7bt"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sknq-8mm1-6qfe"},{"vulnerability":"VCID-snaz-pg1h-8kew"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-t753-w1ha-kqaz"},{"vulnerability":"VCID-tmv3-fzje-sbck"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-vxpj-xygq-9be2"},{"vulnerability":"VCID-vyk2-s5ut-ubbz"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wc8j-qyp4-tqbd"},{"vulnerability":"VCID-wh98-pw9h-cyfx"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-xspf-45t1-2uhf"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"},{"vulnerability":"VCID-yxks-8529-23bj"},{"vulnerability":"VCID-zxz2-xfpd-pbay"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.36.0"}],"aliases":["CVE-2014-0138"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z8h3-fdj8-xuaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34698?format=json","vulnerability_id":"VCID-zxz2-xfpd-pbay","summary":"Multiple vulnerabilities have been found in cURL, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8617.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-8617.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8617","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19575","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19573","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19491","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19517","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19482","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19714","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19763","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19488","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19567","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19619","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19623","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23949","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24209","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24262","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24248","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-8617"},{"reference_url":"https://curl.se/docs/CVE-2016-8617.html","reference_id":"","reference_type":"","scores":[{"value":"Medium","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2016-8617.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8617"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8621"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8624"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.securitytracker.com/id/1037192","reference_id":"1037192","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/"}],"url":"http://www.securitytracker.com/id/1037192"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388377","reference_id":"1388377","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1388377"},{"reference_url":"http://www.securityfocus.com/bid/94097","reference_id":"94097","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/"}],"url":"http://www.securityfocus.com/bid/94097"},{"reference_url":"https://curl.haxx.se/docs/adv_20161102C.html","reference_id":"adv_20161102C.html","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/"}],"url":"https://curl.haxx.se/docs/adv_20161102C.html"},{"reference_url":"https://security.archlinux.org/ASA-201611-10","reference_id":"ASA-201611-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-10"},{"reference_url":"https://security.archlinux.org/ASA-201611-4","reference_id":"ASA-201611-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-4"},{"reference_url":"https://security.archlinux.org/ASA-201611-5","reference_id":"ASA-201611-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-5"},{"reference_url":"https://security.archlinux.org/ASA-201611-7","reference_id":"ASA-201611-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-7"},{"reference_url":"https://security.archlinux.org/ASA-201611-8","reference_id":"ASA-201611-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-8"},{"reference_url":"https://security.archlinux.org/ASA-201611-9","reference_id":"ASA-201611-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201611-9"},{"reference_url":"https://security.archlinux.org/AVG-60","reference_id":"AVG-60","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-60"},{"reference_url":"https://security.archlinux.org/AVG-61","reference_id":"AVG-61","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-61"},{"reference_url":"https://security.archlinux.org/AVG-62","reference_id":"AVG-62","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-62"},{"reference_url":"https://security.archlinux.org/AVG-63","reference_id":"AVG-63","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-63"},{"reference_url":"https://security.archlinux.org/AVG-65","reference_id":"AVG-65","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-65"},{"reference_url":"https://security.archlinux.org/AVG-66","reference_id":"AVG-66","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-66"},{"reference_url":"https://curl.haxx.se/CVE-2016-8617.patch","reference_id":"CVE-2016-8617.patch","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/"}],"url":"https://curl.haxx.se/CVE-2016-8617.patch"},{"reference_url":"https://security.gentoo.org/glsa/201701-47","reference_id":"GLSA-201701-47","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/"}],"url":"https://security.gentoo.org/glsa/201701-47"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617","reference_id":"show_bug.cgi?id=CVE-2016-8617","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-16T13:31:30Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8617"},{"reference_url":"https://usn.ubuntu.com/3123-1/","reference_id":"USN-3123-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3123-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/370780?format=json","purl":"pkg:generic/curl.se/curl@7.51.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1k8f-qgcv-xkhb"},{"vulnerability":"VCID-1mf9-u8y1-zbb1"},{"vulnerability":"VCID-26ju-84rx-c7b9"},{"vulnerability":"VCID-29n1-4u2b-tkgj"},{"vulnerability":"VCID-2b39-ubrt-hkc6"},{"vulnerability":"VCID-2cx5-1qnw-uufj"},{"vulnerability":"VCID-2xmp-jc8v-bucb"},{"vulnerability":"VCID-3qck-hm3c-tqaq"},{"vulnerability":"VCID-3sy2-4f3g-zkac"},{"vulnerability":"VCID-47qb-2qkw-1qej"},{"vulnerability":"VCID-56wg-yafz-gkgx"},{"vulnerability":"VCID-5n7a-9j23-e7dj"},{"vulnerability":"VCID-6we4-n888-6qhe"},{"vulnerability":"VCID-6yb7-t8qs-cbch"},{"vulnerability":"VCID-75nw-4e2d-zqgg"},{"vulnerability":"VCID-79sv-kzb5-hbc4"},{"vulnerability":"VCID-7srk-hshe-h3f4"},{"vulnerability":"VCID-7vt9-pf5q-uqb6"},{"vulnerability":"VCID-8zks-th64-33b8"},{"vulnerability":"VCID-9ggp-5wfj-ufcq"},{"vulnerability":"VCID-9nak-pscy-e7gs"},{"vulnerability":"VCID-a9b6-m25r-kygw"},{"vulnerability":"VCID-ae59-w7a1-7keg"},{"vulnerability":"VCID-arjz-67yz-wkg9"},{"vulnerability":"VCID-bb2f-7qrm-1kca"},{"vulnerability":"VCID-bgdk-ebn7-eycn"},{"vulnerability":"VCID-bhvd-ntxz-dkg4"},{"vulnerability":"VCID-bv57-gvfs-qfhj"},{"vulnerability":"VCID-cbah-e86c-w3fj"},{"vulnerability":"VCID-cbph-fu9d-gbah"},{"vulnerability":"VCID-cp4n-p2z3-43b4"},{"vulnerability":"VCID-dc3c-3wab-57gh"},{"vulnerability":"VCID-ddgz-rczw-jqfw"},{"vulnerability":"VCID-dgtq-eaav-jyhf"},{"vulnerability":"VCID-etzn-uhck-h7b2"},{"vulnerability":"VCID-fnj3-2du1-4bhx"},{"vulnerability":"VCID-fp65-97n1-xuaj"},{"vulnerability":"VCID-g4jw-azg9-gqbs"},{"vulnerability":"VCID-ggt7-eejg-xfb6"},{"vulnerability":"VCID-gnx2-djyk-uyaf"},{"vulnerability":"VCID-hj8v-tgnn-mfdw"},{"vulnerability":"VCID-hrsy-694u-2fec"},{"vulnerability":"VCID-hudt-78dw-tkf2"},{"vulnerability":"VCID-j2qx-np45-4qdu"},{"vulnerability":"VCID-jnfc-8f5d-pyh4"},{"vulnerability":"VCID-ju6h-a1sz-f7e5"},{"vulnerability":"VCID-mkyr-w79c-qqfz"},{"vulnerability":"VCID-ms2r-94ph-yyh3"},{"vulnerability":"VCID-n51k-39uk-auca"},{"vulnerability":"VCID-ph5u-5j8n-4qah"},{"vulnerability":"VCID-q229-ag6u-u3hv"},{"vulnerability":"VCID-qbpd-star-6fgn"},{"vulnerability":"VCID-qdcn-2u3v-b3cv"},{"vulnerability":"VCID-qpfa-s6sd-8yct"},{"vulnerability":"VCID-r7bh-7wur-xffs"},{"vulnerability":"VCID-rmez-cwu2-2ya7"},{"vulnerability":"VCID-rsgn-r3yp-nkb6"},{"vulnerability":"VCID-s73y-y7v7-43cm"},{"vulnerability":"VCID-sh5a-fmna-wffr"},{"vulnerability":"VCID-sshs-1k6e-cqer"},{"vulnerability":"VCID-syz5-5y6f-s7er"},{"vulnerability":"VCID-t4gn-9fw8-gkc3"},{"vulnerability":"VCID-tz47-j4ey-t7g6"},{"vulnerability":"VCID-u4bx-xqb3-vuef"},{"vulnerability":"VCID-v3qf-6wju-1bg8"},{"vulnerability":"VCID-w8ks-xk66-r3fm"},{"vulnerability":"VCID-wrh2-77dv-hbdz"},{"vulnerability":"VCID-wwam-tcmv-kqhc"},{"vulnerability":"VCID-x57x-w8g8-7ybz"},{"vulnerability":"VCID-y32p-52ps-4ug4"},{"vulnerability":"VCID-y4x5-n5m2-x7bq"},{"vulnerability":"VCID-ydcp-ufa5-rqhd"},{"vulnerability":"VCID-yvdd-ataf-ckf1"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.51.0"}],"aliases":["CVE-2016-8617"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zxz2-xfpd-pbay"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:generic/curl.se/curl@7.12.2"}